You are on page 1of 6

Transactions on Computer Science and Technology

December 2012, Volume 1, Issue 1, PP.1-6

A Study of Protection the Information Security


on the Internet of Things Based on Game Theory
Shanshan Li 1, Wei Jiang 2, Tianfa Jiang1 #
1. College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China
2. SI Center, China Software Testing Center, Beijing, 100048, China
#E-mailjiangtianfa@163.com

Abstract
Firstly, this paper introduces the technology for the Internet of Things and the characteristics of information security, and
discusses the needs of security related the internet of things. This method based on combination of the dependency strategy
between the attacker and defender is proposed for protection the internet information security. Secondly, a set of effective security
system model which ensure the interests of defenders based on game theory is proposed. The research results demonstrate that the
system gives the best response decision strategy, and the strategy for in the face of attack. It is conducive to the analysis of
practical problems and provides a new reference for the integrity of the information security system of the Internet of Things.
Key words: the Internet of Things; Information security; Attack and defense; Game theory

1 2 1 #
1 , 430074
2 100048

Nash

1995 1999 Auto-ID [1]


, ( RFID)
, ,
, ,
[2]

40571128
B20110804,B20110807

1
www.ivypub.org/cst


(Privacy) ITU
[3] 30
30

1
1.1
RFID
(Sensor technologies) (Smart technologies)(Nanotechnology) [4]

RFID
RFID
1RFID
2RFID

34[4]
M2M

M2M
CDMAGPRSIEEE802.11a/b/g WLAN M2M
[5]

""

0.1~100 nm

[4]

1.2

1:30

1
[6]
1
2
RFID RFID
2
www.ivypub.org/cst

3
TCP/IP

2
2.1

[7]
Zermelo
Borelvon Neumann
,
1954 H aywood[8]

1997 Burke[9]2002 Lye


Wing [10]2003 Liu[11]

2.2
strategic form representation
extensive form representation

,
,[12]
1

i = 1, , n N



3
www.ivypub.org/cst

(1)

:
(2)

2.3

[13]RFID

[12- 13] 3

2.4 Nash

[14]

4
www.ivypub.org/cst

[15]

Nash

ABC

5
www.ivypub.org/cst

Nash

References
[1] Gan Zhixiang. Research on Background of the Origin and Development of the Internet of Things[J]. Modern Economic
Information,2010,(01):157-158.
[2] Liu jian, Hou yi. A Study of Protection for Messages Safety on The Internet of Things [J]. Microcom Puter Applications, Vol 32 N
o.1Jan ,2011:15-16.
[3] ITU Strategy and policy Unit (SPU)ITU Internet Reports 2005:TheInternnet of Things[R].Ceneva: International Telecommunication
Union(ITU),2005.
[4] Sun chuanning, Zhangxue. The concept of things and Key Technologies [J]. Fujian computer,2010,(12):39-41.
[5] He Ming,Jiang jun,Chen xiaohu, Chen guohua.Technology and Security of Internet of Things [J].Computer security,2011,(04):49-50.
[6] Floerkemeier C. Langheinrich M, Fleisch E, Mattern F. The Internet of Things: Lecture Notes in Computer Science. Springer, 2008,
49-52.
[7] Jiang wei,Fang bin2xing,Tian zhi2hong,Zhang hong2li.Evaluating Network Security and Optimal Active Defense Based on
Attack2Defense Game Model [J].Cjinese Journal of Computer,2009,32(04):818-819.
[8] Haywood O G. Militaryd ecision and game theory. Journal of the Operations Research Society of America, 1954, 2 ( 4 ) :3652 385.
[9] Burke D. Towards a game theory model of information warfare[ M. S. dissert at ion ] . Technical Report : AFIT / GSS/LAL/ 99D2 1.
Airforce Institute of Technology, 1999.
[10] Lye K2W, Win g J. Game strategies in network security. School of Computer Science, Carnegie Mellon University, Pittsburgh:
Technical Report CMU 2CS2022 136, 2002.
[11] Liu P, Zang W. Incentive based modeling and inference of attacker intent, objectives, and strategies/ / Proceedings of the 10th ACM
Computer and Communications Security Conference ( CCS. 03) . Washington, DC, 2003: 1792189.
[12] Meng Xianghong. Study on Offence and Defense of Information Security Based on Game Theory [J].Computer Technology and
Development,2010,20(04):160-162.
[13] Zhao Jinlong, Man dapeng, Yang wu. Network System Security Analysis Based on Game Strategies Graph. Information Systems
for Crisis Response and Management (ISCRAM), IEEE2011,9(27-29):144-148.
[14] Guo Peng, Yang Xiaoqin.On the Game Theory and the Nash Equilibrium[J]. Natural Science Journal of Harbin Normal
University,2006,(04):25-28.
[15] Ji hongzhu,Gu naijie. A Quantitative Network Security Evaluation Algorithm based on Game Theory[J].Computer Applications and
Software,2009,26(09):4-6.

1990-

E-mail280396625@qq.com

*1954-, ,

11

10 100

E-mailjiangtianfa@163.com

6
www.ivypub.org/cst

You might also like