Trilateral Game Aided Information Management for Open Complex Giant Systems

  • Dewei Yang
  • Ruiyang Duan
  • Sanghai GuanEmail author
  • Jinwen Sun
  • Huifeng Xue
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 463)


Nowadays, the management and control of open complex giant systems have become a hot topic. In this paper, based on the features of network topology, nodes’ heterogeneity and various information attributes, we propose a trilateral game to model the information flow management mechanism for open complex giant systems. Moreover, the players’ interactions and strategies are elaborated, followed by the derivation of the subgame perfect Nash equilibrium of this game. Furthermore, we provide a toy example relying on the K-anonymity algorithm to model the degree of ‘information transparency’ for the information supervisors. Finally, sufficient simulation results and theoretical analysis show the efficiency and feasibility of our proposed model.


Open complex giant system Information management Game theory Trilateral game System engineering 


  1. 1.
    Jiang, C., Chen, Y., Liu, K.R.: Evolutionary dynamics of information diffusion over social networks. IEEE Trans. Sig. Process. 62(17), 4573–4586 (2014)Google Scholar
  2. 2.
    Jiang, C., Zhang, H., Ren, Y., Han, Z., Chen, K.-C., Hanzo, L.: Machine learning paradigms for next-generation wireless networks. IEEE Wirel. Commun. PP, 2–9 (2016)Google Scholar
  3. 3.
    Wang, J., Jiang, C., Quek, T.Q.S., Wang, X., Ren, Y.: The value strength aided information diffusion in socially-aware mobile networks. IEEE Access 4, 3907–3919 (2016)Google Scholar
  4. 4.
    Qiu, W., Wang, Y., Yu, J.: A game theoretical model of information dissemination in social network. In: International Conference on Complex Systems, pp. 1–6 (2012)Google Scholar
  5. 5.
    Zhang, J., Gauthier, V., Labiod, H., Banerjee, A., Afifi, H.: Information dissemination in vehicular networks using evolutionary game theory. In: 2014 IEEE International Conference on Communications, Sydney, Australia, pp. 124–129 (2013)Google Scholar
  6. 6.
    Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)Google Scholar
  7. 7.
    Xu, L., Jiang, C., Wang, J., Yuan, J., Ren, Y.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Dewei Yang
    • 1
  • Ruiyang Duan
    • 2
  • Sanghai Guan
    • 2
    Email author
  • Jinwen Sun
    • 3
  • Huifeng Xue
    • 1
  1. 1.China Academy of Aerospace Systems Science and EngineeringBeijingChina
  2. 2.Tsinghua UniversityBeijingChina
  3. 3.School of Reliability and Systems EngineeringBeihang UniversityBeijingChina

Personalised recommendations