Advertisement

Trilateral Game Aided Information Management for Open Complex Giant Systems

  • Dewei Yang
  • Ruiyang Duan
  • Sanghai Guan
  • Jinwen Sun
  • Huifeng Xue
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 463)

Abstract

Nowadays, the management and control of open complex giant systems have become a hot topic. In this paper, based on the features of network topology, nodes’ heterogeneity and various information attributes, we propose a trilateral game to model the information flow management mechanism for open complex giant systems. Moreover, the players’ interactions and strategies are elaborated, followed by the derivation of the subgame perfect Nash equilibrium of this game. Furthermore, we provide a toy example relying on the K-anonymity algorithm to model the degree of ‘information transparency’ for the information supervisors. Finally, sufficient simulation results and theoretical analysis show the efficiency and feasibility of our proposed model.

Keywords

Open complex giant system Information management Game theory Trilateral game System engineering 

References

  1. 1.
    Jiang, C., Chen, Y., Liu, K.R.: Evolutionary dynamics of information diffusion over social networks. IEEE Trans. Sig. Process. 62(17), 4573–4586 (2014)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Jiang, C., Zhang, H., Ren, Y., Han, Z., Chen, K.-C., Hanzo, L.: Machine learning paradigms for next-generation wireless networks. IEEE Wirel. Commun. PP, 2–9 (2016)Google Scholar
  3. 3.
    Wang, J., Jiang, C., Quek, T.Q.S., Wang, X., Ren, Y.: The value strength aided information diffusion in socially-aware mobile networks. IEEE Access 4, 3907–3919 (2016)CrossRefGoogle Scholar
  4. 4.
    Qiu, W., Wang, Y., Yu, J.: A game theoretical model of information dissemination in social network. In: International Conference on Complex Systems, pp. 1–6 (2012)Google Scholar
  5. 5.
    Zhang, J., Gauthier, V., Labiod, H., Banerjee, A., Afifi, H.: Information dissemination in vehicular networks using evolutionary game theory. In: 2014 IEEE International Conference on Communications, Sydney, Australia, pp. 124–129 (2013)Google Scholar
  6. 6.
    Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Xu, L., Jiang, C., Wang, J., Yuan, J., Ren, Y.: Information security in big data: privacy and data mining. IEEE Access 2, 1149–1176 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Dewei Yang
    • 1
  • Ruiyang Duan
    • 2
  • Sanghai Guan
    • 2
  • Jinwen Sun
    • 3
  • Huifeng Xue
    • 1
  1. 1.China Academy of Aerospace Systems Science and EngineeringBeijingChina
  2. 2.Tsinghua UniversityBeijingChina
  3. 3.School of Reliability and Systems EngineeringBeihang UniversityBeijingChina

Personalised recommendations