系统工程与电子技术 ›› 2026, Vol. 48 ›› Issue (3): 1072-1082.doi: 10.12305/j.issn.1001-506X.2026.03.31

• 通信与网络 • 上一篇    

物联网安全与隐私保护中博弈论的应用综述

金志刚, 刘泽培(), 武晓栋   

  1. 天津大学电气自动化与信息工程学院,天津 300072
  • 收稿日期:2024-12-02 出版日期:2026-03-25 发布日期:2026-04-13
  • 通讯作者: 金志刚 E-mail:1022234040@tju.edu.cn
  • 作者简介:刘泽培(1998—),男,博士研究生,主要研究方向为联邦学习、博弈论、强化学习、网络安全、隐私保护
    武晓栋(1996—),男,博士研究生,主要研究方向为网络安全、联邦学习、入侵检测
  • 基金资助:
    国家自然科学基金(52171337)资助课题

Survey of game theory applications in Internet of Things security and privacy

Zhigang JIN, Zepei LIU(), Xiaodong WU   

  1. School of Electrical and Information Engineering,Tianjin University,Tianjin 300072,China
  • Received:2024-12-02 Online:2026-03-25 Published:2026-04-13
  • Contact: Zhigang JIN E-mail:1022234040@tju.edu.cn

摘要:

物联网的安全与隐私保护是研究热点和技术难题。博弈论方法能够有效分析物联网系统中多方利益主体的博弈行为,在决策分析层面对防御技术形成重要补充。综述了近五年来博弈论在物联网安全与隐私保护中的应用,系统梳理了其在安全对抗中的应用场景与技术贡献。按照对抗主体的不同,相关研究分为两类:一类聚焦攻防双方的博弈,另一类针对特定物联网场景中不同组织之间的交互与协作。深入讨论了当前研究的挑战,包括均衡假设的合理性、计算复杂性以及算法实用性等问题,并展望了结合强化学习技术开发智能博弈安全机制的发展方向。

关键词: 物联网安全, 隐私保护, 博弈论, 纳什均衡, 强化学习, 智能安全机制

Abstract:

The security and privacy protection of the Internet of Things is a prominent research hotspot and a challenging technical issue. Game theory effectively analyzes the interactions among multiple stakeholders in Internet of Things systems and provides critical theoretical support for decision-making in defense technologies. The applications of game theory in Internet of Things security and privacy protection over the past five years are reviewed, systematically summarizing its application scenarios and technical contributions in security confrontations. Based on different adversarial entities, the related research is categorized into two types: dynamic games between attackers and defenders, and interactive games among different organizations in specific Internet of Things scenarios. The current challenges are explored, such as the rationality of equilibrium assumptions, computational complexity, and practical applicability of algorithms. Finally, future research directions are outlined, focusing on integrating reinforcement learning to develop intelligent game-based security mechanisms.

Key words: Internet of Things security, privacy protection, game theory, Nash equilibrium, reinforcement learning, intelligent security mechanism

中图分类号: