{"id":"https://openalex.org/W4414196870","doi":"https://doi.org/10.1109/jiot.2025.3608507","title":"Advances in Attack\u2013Defense Game Models for IIoT: A Review","display_name":"Advances in Attack\u2013Defense Game Models for IIoT: A Review","publication_year":2025,"publication_date":"2025-09-15","ids":{"openalex":"https://openalex.org/W4414196870","doi":"https://doi.org/10.1109/jiot.2025.3608507"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3608507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3608507","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101846515","display_name":"Fengjun Zhang","orcid":"https://orcid.org/0000-0002-3830-8786"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fengjun Zhang","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091090025","display_name":"Yong Cui","orcid":"https://orcid.org/0000-0002-5171-739X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Cui","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035343285","display_name":"Jiahui Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahui Yu","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080383317","display_name":"Jian Li","orcid":"https://orcid.org/0000-0002-6979-4510"},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Li","raw_affiliation_strings":["30th Research Institute, China Electronics Technology Group Corporation, Chengdu, Sichuan, China","30th Research Institute of China Electronics Technology Group Corporation, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"30th Research Institute, China Electronics Technology Group Corporation, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I2800372957"]},{"raw_affiliation_string":"30th Research Institute of China Electronics Technology Group Corporation, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I2800372957"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100386339","display_name":"Lu Li","orcid":"https://orcid.org/0000-0002-9606-4206"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lu Li","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112122772","display_name":"Cui Gan","orcid":"https://orcid.org/0009-0007-9631-5363"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangcan Cui","raw_affiliation_strings":["University of Electronic Science and Technology of China, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100670303","display_name":"Qinghua Li","orcid":"https://orcid.org/0000-0002-5143-6678"},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinghua Li","raw_affiliation_strings":["30th Research Institute, China Electronics Technology Group Corporation, Chengdu, Sichuan, China","30th Research Institute of China Electronics Technology Group Corporation, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"30th Research Institute, China Electronics Technology Group Corporation, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I2800372957"]},{"raw_affiliation_string":"30th Research Institute of China Electronics Technology Group Corporation, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I2800372957"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101840117","display_name":"Kai Shi","orcid":"https://orcid.org/0000-0002-7174-7924"},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Shi","raw_affiliation_strings":["30th Research Institute, China Electronics Technology Group Corporation, Chengdu, Sichuan, China","30th Research Institute of China Electronics Technology Group Corporation, Chengdu, Sichuan, China"],"affiliations":[{"raw_affiliation_string":"30th Research Institute, China Electronics Technology Group Corporation, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I2800372957"]},{"raw_affiliation_string":"30th Research Institute of China Electronics Technology Group Corporation, Chengdu, Sichuan, China","institution_ids":["https://openalex.org/I2800372957"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5101846515"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33026843,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"22","first_page":"46417","last_page":"46430"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.8756999969482422,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.8756999969482422,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.6060000061988831},{"id":"https://openalex.org/keywords/stochastic-game","display_name":"Stochastic game","score":0.41940000653266907},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.4009999930858612},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.3434999883174896},{"id":"https://openalex.org/keywords/evolutionary-game-theory","display_name":"Evolutionary game theory","score":0.3370000123977661},{"id":"https://openalex.org/keywords/replicator-equation","display_name":"Replicator equation","score":0.33649998903274536},{"id":"https://openalex.org/keywords/imperfect","display_name":"Imperfect","score":0.3206999897956848},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.31700000166893005}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8012999892234802},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.6060000061988831},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.41940000653266907},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.40939998626708984},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.4009999930858612},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35899999737739563},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3522999882698059},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3499000072479248},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.3434999883174896},{"id":"https://openalex.org/C20249471","wikidata":"https://www.wikidata.org/wiki/Q2298789","display_name":"Evolutionary game theory","level":3,"score":0.3370000123977661},{"id":"https://openalex.org/C50318809","wikidata":"https://www.wikidata.org/wiki/Q2145081","display_name":"Replicator equation","level":3,"score":0.33649998903274536},{"id":"https://openalex.org/C2780310539","wikidata":"https://www.wikidata.org/wiki/Q12547192","display_name":"Imperfect","level":2,"score":0.3206999897956848},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.31700000166893005},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.30140000581741333},{"id":"https://openalex.org/C123676819","wikidata":"https://www.wikidata.org/wiki/Q1074338","display_name":"Perfect information","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.2937999963760376},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C503285160","wikidata":"https://www.wikidata.org/wiki/Q858057","display_name":"Game design","level":2,"score":0.2793000042438507},{"id":"https://openalex.org/C43091099","wikidata":"https://www.wikidata.org/wiki/Q1067788","display_name":"Through-the-lens metering","level":3,"score":0.2761000096797943},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2662999927997589},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26179999113082886},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2565999925136566},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3608507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3608507","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":118,"referenced_works":["https://openalex.org/W1501439223","https://openalex.org/W1533945010","https://openalex.org/W1538412636","https://openalex.org/W1542822007","https://openalex.org/W1964972187","https://openalex.org/W1979025384","https://openalex.org/W2015787697","https://openalex.org/W2062757535","https://openalex.org/W2066611805","https://openalex.org/W2067064328","https://openalex.org/W2071093068","https://openalex.org/W2072952873","https://openalex.org/W2095642840","https://openalex.org/W2140576100","https://openalex.org/W2151488545","https://openalex.org/W2155883880","https://openalex.org/W2168864394","https://openalex.org/W2295803031","https://openalex.org/W2328645426","https://openalex.org/W2471739909","https://openalex.org/W2528551565","https://openalex.org/W2586744474","https://openalex.org/W2589002696","https://openalex.org/W2604409140","https://openalex.org/W2755391027","https://openalex.org/W2766537588","https://openalex.org/W2796578942","https://openalex.org/W2801119105","https://openalex.org/W2805611890","https://openalex.org/W2806064618","https://openalex.org/W2809199914","https://openalex.org/W2816293441","https://openalex.org/W2886018600","https://openalex.org/W2894539184","https://openalex.org/W2899705102","https://openalex.org/W2913557035","https://openalex.org/W2913960061","https://openalex.org/W2914411038","https://openalex.org/W2914848105","https://openalex.org/W2921920205","https://openalex.org/W2936695786","https://openalex.org/W2945090481","https://openalex.org/W2946511964","https://openalex.org/W2950601371","https://openalex.org/W2958264303","https://openalex.org/W2963090022","https://openalex.org/W2963492322","https://openalex.org/W2964430649","https://openalex.org/W2965836847","https://openalex.org/W2968730756","https://openalex.org/W2972321799","https://openalex.org/W2974036064","https://openalex.org/W2976920196","https://openalex.org/W2978805838","https://openalex.org/W2980975995","https://openalex.org/W2981222105","https://openalex.org/W2989874956","https://openalex.org/W2994765967","https://openalex.org/W2996894858","https://openalex.org/W2997859350","https://openalex.org/W2999919898","https://openalex.org/W3007504164","https://openalex.org/W3013013594","https://openalex.org/W3022437389","https://openalex.org/W3026890586","https://openalex.org/W3027038700","https://openalex.org/W3033205445","https://openalex.org/W3037650341","https://openalex.org/W3044997939","https://openalex.org/W3048135502","https://openalex.org/W3048960050","https://openalex.org/W3084386044","https://openalex.org/W3089067657","https://openalex.org/W3090865155","https://openalex.org/W3110370583","https://openalex.org/W3123950820","https://openalex.org/W3137920819","https://openalex.org/W3139102972","https://openalex.org/W3162111110","https://openalex.org/W3166775454","https://openalex.org/W3176778145","https://openalex.org/W3190161635","https://openalex.org/W3195737479","https://openalex.org/W3202603325","https://openalex.org/W3209573215","https://openalex.org/W3210904609","https://openalex.org/W3215769872","https://openalex.org/W3216460516","https://openalex.org/W4206281848","https://openalex.org/W4211216608","https://openalex.org/W4213438982","https://openalex.org/W4220877568","https://openalex.org/W4221035913","https://openalex.org/W4224247256","https://openalex.org/W4226227702","https://openalex.org/W4226394980","https://openalex.org/W4293233427","https://openalex.org/W4300826984","https://openalex.org/W4312768699","https://openalex.org/W4323519324","https://openalex.org/W4378800456","https://openalex.org/W4383109237","https://openalex.org/W4386090462","https://openalex.org/W4386102817","https://openalex.org/W4386636509","https://openalex.org/W4387831783","https://openalex.org/W4391075704","https://openalex.org/W4396691029","https://openalex.org/W4399114261","https://openalex.org/W4400234274","https://openalex.org/W4400275938","https://openalex.org/W4401414970","https://openalex.org/W4401588225","https://openalex.org/W4402125282","https://openalex.org/W4402557739","https://openalex.org/W4402661169","https://openalex.org/W4403600608","https://openalex.org/W4408167363"],"related_works":[],"abstract_inverted_index":{"The":[0,180],"industrial":[1,8],"internet":[2],"of":[3,19,45,52,166,177],"things":[4],"(IIoT)":[5],"significantly":[6],"increases":[7],"productivity":[9],"but":[10,233],"also":[11,234],"brings":[12],"more":[13],"network":[14],"security":[15,24,82,231,245],"threats.The":[16],"evolving":[17],"diversity":[18],"cyber":[20],"attacks":[21],"has":[22],"exacerbated":[23],"risks":[25],"in":[26,97,187,228],"IIoT":[27,81,98],"systems,":[28],"rendering":[29],"conventional":[30],"passive":[31],"defense":[32,54,210],"mechanisms":[33],"inadequate":[34],"against":[35],"sophisticated":[36],"intrusions,":[37],"such":[38],"as":[39,60],"advanced":[40],"persistent":[41],"threat(APT),":[42],"distributed":[43],"denial":[44],"services(DDoS)":[46],"etc..":[47],"This":[48,220],"necessitates":[49],"the":[50,146,164,226],"adoption":[51],"proactive":[53],"strategies,":[55],"where":[56],"game":[57,77,112,152,170,214],"theory":[58,78],"emerges":[59],"a":[61,87,137,173,238],"powerful":[62],"mathematical":[63],"framework":[64,91,148,241],"for":[65,92,242],"modeling":[66],"dynamic":[67,194],"attack-defense":[68],"interactions.":[69],"Unlike":[70],"existing":[71,188],"surveys":[72,232],"that":[73],"focus":[74],"solely":[75],"on":[76,129],"fundamentals":[79],"or":[80],"mechanisms,":[83,211],"this":[84],"paper":[85],"establishes":[86],"novel":[88],"three-dimensional":[89],"methodological":[90],"systematically":[93],"reviewing":[94],"game-theoretic":[95,189,230],"applications":[96],"security:":[99],"(1)":[100],"theoretical":[101,147],"foundations":[102],"(game":[103],"components":[104,153],"and":[105,114,132,154,197,216],"taxonomy),":[106],"(2)":[107],"model":[108],"implementations":[109],"(eight":[110],"principal":[111,169],"types),":[113],"(3)":[115],"comparative":[116,175],"analyses":[117],"(advantages/limitations":[118],"per":[119],"model).":[120],"Crucially,":[121],"we":[122,158],"introduce":[123],"an":[124],"innovative":[125],"classification":[126],"perspective":[127],"based":[128],"player":[130],"relationships":[131],"payoff":[133],"computation":[134],"methods":[135],"-":[136],"significant":[138],"departure":[139],"from":[140],"prior":[141],"categorizations.":[142],"We":[143],"first":[144],"establish":[145],"by":[149],"examining":[150],"essential":[151],"taxonomy":[155],"classifications.":[156],"Subsequently,":[157],"investigate":[159],"current":[160],"research":[161,206],"progress":[162],"through":[163],"lens":[165],"these":[167],"eight":[168],"models,":[171,215],"conducting":[172],"comprehensive":[174],"analysis":[176,203],"their":[178],"category,advantages,drawbacks.":[179],"study":[181],"further":[182],"identifies":[183],"three":[184],"fundamental":[185],"limitations":[186],"approaches:":[190],"imperfect":[191],"information":[192],"processing,":[193],"adaptation":[195],"constraints,":[196],"multi-agent":[198],"coordination":[199],"challenges.":[200],"Our":[201],"critical":[202],"proposed":[204],"future":[205],"directions":[207],"emphasizing":[208],"hybrid":[209],"machine":[212],"learning-enhanced":[213],"real-time":[217],"response":[218],"architectures.":[219],"structured":[221],"review":[222],"not":[223],"only":[224],"fills":[225],"gap":[227],"IIoT-specific":[229],"provides":[235],"researchers":[236],"with":[237],"unified":[239],"conceptual":[240],"developing":[243],"adaptive":[244],"solutions.":[246]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
