In response to the additional load impact caused by the integration of electric vehicles (EVs) into the grid or microgrids (MGs), as well as the issue of low responsiveness of EV users during vehicle-to-vehicle (V2V) ...In response to the additional load impact caused by the integration of electric vehicles (EVs) into the grid or microgrids (MGs), as well as the issue of low responsiveness of EV users during vehicle-to-vehicle (V2V) power exchange processes, this paper explores a multi-party energy trading model considering user responsiveness under low carbon goals. The model takes into account the stochastic charging and discharging characteristics of EVs, user satisfaction, and energy exchange costs, and formulates utility functions for participating entities. This transforms the competition in multi-party energy trading into a Bayesian game problem, which is subsequently resolved. Furthermore, this paper primarily employs sensitivity analysis to evaluate the impact of multi-party energy trading on user responsiveness and green energy utilization, with the aim of promoting incentives in the electricity trading market and aligning with low-carbon requirements. Finally, through case simulations, the effectiveness of this model for the considered scenarios is demonstrated.展开更多
To avoid uneven energy consuming in wireless sen- sor networks, a clustering routing model is proposed based on a Bayesian game. In the model, Harsanyi transformation is introduced to convert a static game of incomple...To avoid uneven energy consuming in wireless sen- sor networks, a clustering routing model is proposed based on a Bayesian game. In the model, Harsanyi transformation is introduced to convert a static game of incomplete information to the static game of complete but imperfect information. In addition, the existence of Bayesian nash equilibrium is proved. A clustering routing algorithm is also designed according to the proposed model, both cluster head distribution and residual energy are considered in the design of the algorithm. Simulation results show that the algorithm can balance network load, save energy and prolong network lifetime effectively.展开更多
Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the...Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the limited resource, intrusion detection system (IDS) runs all the time to detect intrusion of the attacker which is a costly overhead. In our model, we use game theory to model the interactions between the intrusion detection system and the attacker, and a realistic model is given by using Bayesian game. We solve the game by finding the Bayesian Nash equilibrium. The results of our analysis show that the IDS could work intermittently without compromising on its effectiveness. At the end of this paper, we provide an experiment to verify the rationality and effectiveness of the proposed model.展开更多
The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-...The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-out-of-2 rational secret sharing based on Bayesian game and considering different classes of protocol parties, we propose a 2-out-of-2 secret sharing scheme to solve cooperative problem of a rational secret sharing scheme being played only once. Moreover, we prove that the strategy is a perfect Bayesian equilibrium, adopted only by the parties in their decision-making according to their belief system (denoted by the probability distribution) and Bayes rule, without requiring simultaneous channels.展开更多
Residential flexible resource is attracting much attention in demand response(DR)for peak load shifting.This paper proposes a scenario for multi-stage DR project to schedule energy consumption of residential communiti...Residential flexible resource is attracting much attention in demand response(DR)for peak load shifting.This paper proposes a scenario for multi-stage DR project to schedule energy consumption of residential communities considering the incomplete information.Communities in the scenario can decide whether to participate in DR in each stage,but the decision is the private information that is unknown to other communities.To optimize the energy consumption,a Bayesian game approach is formulated,in which the probability characteristic of the decision-making of residential communities is described with Markov chain considering human behavior of bounded rationality.Simulation results show that the proposed approach can benefit all residential communities and power grid,but the optimization effect is slightly inferior to that in complete information game approach.展开更多
In this paper,we consider to learn the inherent probability distribution of types via knowledge transfer in a two-player repeated Bayesian game,which is a basic model in network security.In the Bayesian game,the attac...In this paper,we consider to learn the inherent probability distribution of types via knowledge transfer in a two-player repeated Bayesian game,which is a basic model in network security.In the Bayesian game,the attacker's distribution of types is unknown by the defender and the defender aims to reconstruct the distribution with historical actions.lt is dificult to calculate the distribution of types directly since the distribution is coupled with a prediction function of the attacker in the game model.Thus,we seek help from an interrelated complete-information game,based on the idea of transfer learning.We provide two different methods to estimate the prediction function in difftrent concrete conditions with knowledge transfer.After obtaining the estimated prediction function,the deiender can decouple the inherent distribution and the prediction function in the Bayesian game,and moreover,reconstruct the distribution of the attacker's types.Finally,we give numerical examples to illustrate the effectiveness of our methods.展开更多
The present study discusses the relationships between two independently developed models of games with incomplete information, hypergames (Bennett, 1977) and Bayesian games (Harsanyi, 1967). The authors first show...The present study discusses the relationships between two independently developed models of games with incomplete information, hypergames (Bennett, 1977) and Bayesian games (Harsanyi, 1967). The authors first show that any hypergame can naturally be reformulated in terms of Bayesian games in an unified way. The transformation procedure is called Bayesian representation of hypergame. The authors then prove that some equilibrium concepts defined for hypergames are in a sense equivalent to those for Bayesian games. Furthermore, the authors discuss carefully based on the proposed analysis how each model should be used according to the analyzer's purpose.展开更多
This paper discusses the relationship of two independently developed models of games with incomplete information,hierarchical hypergames and Bayesian games.It can be considered as a generalization of the previous stud...This paper discusses the relationship of two independently developed models of games with incomplete information,hierarchical hypergames and Bayesian games.It can be considered as a generalization of the previous study on the theoretical comparison of simple hypergames and Bayesian games(Sasaki and Kijima,2012) by taking into account hierarchy of perceptions,i.e.,an agent's perception about the other agents' perceptions,and so on.The authors first introduce the general way of transformation of any hierarchical hypergames into corresponding Bayesian games,which was called as the Bayesian representation of hierarchical hypergames.The authors then show that some equilibrium concepts for hierarchical hypergames can be associated with those for Bayesian games and discuss implications of the results.展开更多
To explore the influence of quantum information on the common social problem of honesty and trickery,we propose a Bayesian model for the quantum prisoners’dilemma game.In this model,the players’strategy formation is...To explore the influence of quantum information on the common social problem of honesty and trickery,we propose a Bayesian model for the quantum prisoners’dilemma game.In this model,the players’strategy formation is regarded as a negotiation of their move contract based on their types of decision policies,honesty or trickery.Although the implementation of quantum information cannot eliminate tricky players,players in our model can always end up with higher payoffs than in the classical game.For a good proportion of a credibility parameter value,a rational player will take an honest action,which is in remarkable contrast to the observation that players tend to defect in the classical prisoners’dilemma game.This research suggests that honesty will be promoted to enhance cooperation with the assistance of quantum information resources.展开更多
IoT security is very crucial to IoT applications,and security situational awareness can assess the overall security status of the IoT.Traditional situational awareness methods only consider the unilateral impact of at...IoT security is very crucial to IoT applications,and security situational awareness can assess the overall security status of the IoT.Traditional situational awareness methods only consider the unilateral impact of attack or defense,but lackconsideration of joint actions by both parties.Applying gametheory to security situational awareness can measure the impact of the opposition and interdependence of the offensive and defensive parties.This paper proposes an IoT security situational awareness method based on Q-Learning and Bayesian game.Through Q-Learning update,the long-term benefits of action strategies in specific states were obtained,and static Bayesian game methods were used to solve the Bayesian Nash Equilibrium of participants of different types.The proposed method comprehensively considers offensive and defensive actions,obtains optimal defense decisions in multi-state and multi-type situations,and evaluates security situation.Experimental results prove the effectiveness of this method.展开更多
文摘In response to the additional load impact caused by the integration of electric vehicles (EVs) into the grid or microgrids (MGs), as well as the issue of low responsiveness of EV users during vehicle-to-vehicle (V2V) power exchange processes, this paper explores a multi-party energy trading model considering user responsiveness under low carbon goals. The model takes into account the stochastic charging and discharging characteristics of EVs, user satisfaction, and energy exchange costs, and formulates utility functions for participating entities. This transforms the competition in multi-party energy trading into a Bayesian game problem, which is subsequently resolved. Furthermore, this paper primarily employs sensitivity analysis to evaluate the impact of multi-party energy trading on user responsiveness and green energy utilization, with the aim of promoting incentives in the electricity trading market and aligning with low-carbon requirements. Finally, through case simulations, the effectiveness of this model for the considered scenarios is demonstrated.
基金supported by the National Natural Science Fundation of China (60974082 60874085)+2 种基金the Fundamental Research Funds for the Central Universities (K50510700004)the Technology Plan Projects of Guangdong Province (20110401)the Team Project of Hanshan Normal University (LT201001)
文摘To avoid uneven energy consuming in wireless sen- sor networks, a clustering routing model is proposed based on a Bayesian game. In the model, Harsanyi transformation is introduced to convert a static game of incomplete information to the static game of complete but imperfect information. In addition, the existence of Bayesian nash equilibrium is proved. A clustering routing algorithm is also designed according to the proposed model, both cluster head distribution and residual energy are considered in the design of the algorithm. Simulation results show that the algorithm can balance network load, save energy and prolong network lifetime effectively.
文摘Wireless ad ho network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (Dos). Because of the limited resource, intrusion detection system (IDS) runs all the time to detect intrusion of the attacker which is a costly overhead. In our model, we use game theory to model the interactions between the intrusion detection system and the attacker, and a realistic model is given by using Bayesian game. We solve the game by finding the Bayesian Nash equilibrium. The results of our analysis show that the IDS could work intermittently without compromising on its effectiveness. At the end of this paper, we provide an experiment to verify the rationality and effectiveness of the proposed model.
基金Supported by the Major National Science and Technology program (2011ZX03005-002)the National Natural Science Foundation of China (60872041, 61072066, 60963023, 60970143)the Fundamental Research Funds for the Central Universities (JY10000903001, JY10000901034)
文摘The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-out-of-2 rational secret sharing based on Bayesian game and considering different classes of protocol parties, we propose a 2-out-of-2 secret sharing scheme to solve cooperative problem of a rational secret sharing scheme being played only once. Moreover, we prove that the strategy is a perfect Bayesian equilibrium, adopted only by the parties in their decision-making according to their belief system (denoted by the probability distribution) and Bayes rule, without requiring simultaneous channels.
基金the Natural Science Research Project of Jiangsu Higher Education Institutions(No.20KJB470024).
文摘Residential flexible resource is attracting much attention in demand response(DR)for peak load shifting.This paper proposes a scenario for multi-stage DR project to schedule energy consumption of residential communities considering the incomplete information.Communities in the scenario can decide whether to participate in DR in each stage,but the decision is the private information that is unknown to other communities.To optimize the energy consumption,a Bayesian game approach is formulated,in which the probability characteristic of the decision-making of residential communities is described with Markov chain considering human behavior of bounded rationality.Simulation results show that the proposed approach can benefit all residential communities and power grid,but the optimization effect is slightly inferior to that in complete information game approach.
基金This work was supported by the National Key Research and Development Program(No.2016YFB0901900)the National Natural Science Foundation of China(No.61733018)The authors would like to thank Prof.Peng Yi for his helpful suggestions.
文摘In this paper,we consider to learn the inherent probability distribution of types via knowledge transfer in a two-player repeated Bayesian game,which is a basic model in network security.In the Bayesian game,the attacker's distribution of types is unknown by the defender and the defender aims to reconstruct the distribution with historical actions.lt is dificult to calculate the distribution of types directly since the distribution is coupled with a prediction function of the attacker in the game model.Thus,we seek help from an interrelated complete-information game,based on the idea of transfer learning.We provide two different methods to estimate the prediction function in difftrent concrete conditions with knowledge transfer.After obtaining the estimated prediction function,the deiender can decouple the inherent distribution and the prediction function in the Bayesian game,and moreover,reconstruct the distribution of the attacker's types.Finally,we give numerical examples to illustrate the effectiveness of our methods.
基金supported by Grant-in-Aid for Japan Society for the Promotion of Science(JSPS) Fellows, No.21-9482
文摘The present study discusses the relationships between two independently developed models of games with incomplete information, hypergames (Bennett, 1977) and Bayesian games (Harsanyi, 1967). The authors first show that any hypergame can naturally be reformulated in terms of Bayesian games in an unified way. The transformation procedure is called Bayesian representation of hypergame. The authors then prove that some equilibrium concepts defined for hypergames are in a sense equivalent to those for Bayesian games. Furthermore, the authors discuss carefully based on the proposed analysis how each model should be used according to the analyzer's purpose.
文摘This paper discusses the relationship of two independently developed models of games with incomplete information,hierarchical hypergames and Bayesian games.It can be considered as a generalization of the previous study on the theoretical comparison of simple hypergames and Bayesian games(Sasaki and Kijima,2012) by taking into account hierarchy of perceptions,i.e.,an agent's perception about the other agents' perceptions,and so on.The authors first introduce the general way of transformation of any hierarchical hypergames into corresponding Bayesian games,which was called as the Bayesian representation of hierarchical hypergames.The authors then show that some equilibrium concepts for hierarchical hypergames can be associated with those for Bayesian games and discuss implications of the results.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61773399,61673389,and 61273202)the Special Funded Project of China Postdoctoral Science Foundation(Grant No.2017T100792).
文摘To explore the influence of quantum information on the common social problem of honesty and trickery,we propose a Bayesian model for the quantum prisoners’dilemma game.In this model,the players’strategy formation is regarded as a negotiation of their move contract based on their types of decision policies,honesty or trickery.Although the implementation of quantum information cannot eliminate tricky players,players in our model can always end up with higher payoffs than in the classical game.For a good proportion of a credibility parameter value,a rational player will take an honest action,which is in remarkable contrast to the observation that players tend to defect in the classical prisoners’dilemma game.This research suggests that honesty will be promoted to enhance cooperation with the assistance of quantum information resources.
基金the National Key Research and Development Program of China(No.2017YFB1400700).
文摘IoT security is very crucial to IoT applications,and security situational awareness can assess the overall security status of the IoT.Traditional situational awareness methods only consider the unilateral impact of attack or defense,but lackconsideration of joint actions by both parties.Applying gametheory to security situational awareness can measure the impact of the opposition and interdependence of the offensive and defensive parties.This paper proposes an IoT security situational awareness method based on Q-Learning and Bayesian game.Through Q-Learning update,the long-term benefits of action strategies in specific states were obtained,and static Bayesian game methods were used to solve the Bayesian Nash Equilibrium of participants of different types.The proposed method comprehensively considers offensive and defensive actions,obtains optimal defense decisions in multi-state and multi-type situations,and evaluates security situation.Experimental results prove the effectiveness of this method.