Network Security Transmission Based on Bimatrix Game Theory

Based on the bimatrix game theory, the network data transmission has been depicted in a game theory way: the actions of the attacker and defender (legitimate users) are depicted within a two-person, non-cooperative and bimatrix game model, this paper proves the existence of the Nash equilibrium theo...

Full description

Saved in:
Bibliographic Details
Published inWuhan University journal of natural sciences Vol. 11; no. 3; pp. 617 - 620
Main Authors Ying, Zheng, Hanping, Hu, Wenxuan, Guo
Format Journal Article
LanguageEnglish
Chinese
Published Institute of Image Recognition and Artificial Intelligence, Huazhong University of Science and Technology, Wuhan 430074, Hubei, China 01.05.2006
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Based on the bimatrix game theory, the network data transmission has been depicted in a game theory way: the actions of the attacker and defender (legitimate users) are depicted within a two-person, non-cooperative and bimatrix game model, this paper proves the existence of the Nash equilibrium theoretically, which is further illustrated by the experimental resuhs.
Bibliography:bimatrix game
security transmission
TP393
game theory
Nash equilibrium
security transmission; game theory; bimatrix game; Nash equilibrium
42-1405/N
ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:1007-1202
1993-4998
DOI:10.1007/BF02836676