When using traditional game methods to study information security of the wireless sensor networks,players are mostly based on the assumption of completely rational.Based on bounded rationality,the evolutionary game th...When using traditional game methods to study information security of the wireless sensor networks,players are mostly based on the assumption of completely rational.Based on bounded rationality,the evolutionary game theory is used to establish the attack-defense model,analyze the strategy selection process of players,solve the evolutionarily stable strategy and design the optimal strategy selection algorithm.Then,considering the strategy dependence,the incentive and punishment mechanism is introduced to improve the replicator dynamic equation.The simulation results show that the model is reasonable and the algorithm is effective,which provides new theoretical support for the security of wireless sensor networks.展开更多
基金National Natural Science Foundation of China(No.11461038)Innovation Foundation of Colleges and Universities in Gansu Province(No.2020A-033)。
文摘When using traditional game methods to study information security of the wireless sensor networks,players are mostly based on the assumption of completely rational.Based on bounded rationality,the evolutionary game theory is used to establish the attack-defense model,analyze the strategy selection process of players,solve the evolutionarily stable strategy and design the optimal strategy selection algorithm.Then,considering the strategy dependence,the incentive and punishment mechanism is introduced to improve the replicator dynamic equation.The simulation results show that the model is reasonable and the algorithm is effective,which provides new theoretical support for the security of wireless sensor networks.