{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T10:17:20Z","timestamp":1774347440162,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:00:00Z","timestamp":1774310400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:00:00Z","timestamp":1774310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province","doi-asserted-by":"publisher","award":["no.PL2024F008"],"award-info":[{"award-number":["no.PL2024F008"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Crowdsensing networks face complex security threats due to their open architecture and distributed collaboration model. However, existing defense methods neglect the heterogeneity of sensing nodes and information asymmetry between attackers and defenders, resulting in traditional static defense strategies that struggle to adapt to dynamic adversarial environments. To address this challenge, this paper proposes a dynamic collaborative defense model driven by incomplete information differential games. Firstly, a dynamic differential equation system with random perturbation factors is established to characterize the security state evolution process of sensing nodes. Subsequently, an incomplete information differential game model is constructed to analyze attack and defense behaviors, with a Bayesian strategy inference method designed to infer potential strategy preferences of attackers through real-time attack-defense interaction results and node states. This approach overcomes the limitations of static belief updates in traditional incomplete information games. Finally, a defense decision-making algorithm is designed based on optimal control theory. Simulation results demonstrate that the proposed model accurately characterizes strategic interactions between attackers and defenders while providing real-time defensive strategies based on the inference method, improving defense success rates by 24.2%. Additionally, the model exhibits strong adaptability in dynamic network environments, enhancing network availability by 22.3%.<\/jats:p>","DOI":"10.1186\/s42400-026-00577-4","type":"journal-article","created":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T06:38:54Z","timestamp":1774334334000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Collaborative defense model for crowdsensing networks based on incomplete Information differential games"],"prefix":"10.1186","volume":"9","author":[{"given":"Kaiwen","family":"Lou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0571-9247","authenticated-orcid":false,"given":"Guosheng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaodan","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Zixuan","family":"Wan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,24]]},"reference":[{"issue":"12","key":"577_CR1","doi-asserted-by":"publisher","first-page":"2761","DOI":"10.1109\/TMC.2018.2815694","volume":"17","author":"MH Cheung","year":"2018","unstructured":"Cheung MH, Hou F, Huang J (2018) Delay-sensitive mobile crowdsensing: algorithm design and economics. IEEE Trans Mobile Comput 17(12):2761\u20132774","journal-title":"IEEE Trans Mobile Comput"},{"issue":"2024","key":"577_CR2","doi-asserted-by":"publisher","first-page":"101351","DOI":"10.1016\/j.iot.2024.101351","volume":"28","author":"S Dadkhah","year":"2024","unstructured":"Dadkhah S, Neto ECP, Ferreira R, Molokwu RC, Sadeghi S, Ghorbani AA (2024) CICIoMT2024: a benchmark dataset for multi-protocol security assessment in IoMT. Int Things 28(2024):101351","journal-title":"Int Things"},{"issue":"7","key":"577_CR3","doi-asserted-by":"publisher","DOI":"10.3390\/s20072055","volume":"20","author":"VS Dasari","year":"2020","unstructured":"Dasari VS, Kantarci B, Pouryazdan M, Foschini L, Girolami M (2020) Game theory in mobile crowdsensing: a comprehensive survey. Sensors Basel 20(7):2055","journal-title":"Sensors Basel"},{"issue":"12","key":"577_CR4","doi-asserted-by":"publisher","first-page":"16558","DOI":"10.1109\/TIE.2024.3393118","volume":"71","author":"H Fang","year":"2024","unstructured":"Fang H, Yi P (2024) Adaptive decision-making in attack-defense games with bayesian inference of rationality level. IEEE Trans Indus Electron 71(12):16558\u201316567","journal-title":"IEEE Trans Indus Electron"},{"issue":"2024","key":"577_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121255","volume":"236","author":"C Gan","year":"2024","unstructured":"Gan C, Lin J, Huang D-W, Zhu Q, Tian L, Jain DK (2024) Equipment classification based differential game method for advanced persistent threats in Industrial Internet of Things. Expert Syst Appl 236(2024):121255","journal-title":"Expert Syst Appl"},{"issue":"3","key":"577_CR6","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1109\/COMST.2022.3187138","volume":"24","author":"S He","year":"2022","unstructured":"He S, Shi K, Liu C, Guo B, Chen J, Shi Z (2022) Collaborative sensing in internet of things: a comprehensive survey. IEEE Commun Surveys Tutorials. 24(3):1435\u20131474","journal-title":"IEEE Commun Surveys Tutorials."},{"key":"577_CR7","doi-asserted-by":"publisher","first-page":"29806","DOI":"10.1109\/ACCESS.2018.2841885","volume":"6","author":"H Hu","year":"2018","unstructured":"Hu H, Liu Y, Zhang H, Pan R (2018) Optimal network defense strategy selection based on incomplete information evolutionary game. IEEE Access 6:29806\u201329821","journal-title":"IEEE Access"},{"issue":"2","key":"577_CR8","first-page":"1016","volume":"23","author":"J Huang","year":"2024","unstructured":"Huang J, Kong L, Cheng L, Dai H-N, Qiu M, Chen G (2024) BlockSense: towards trustworthy mobile crowdsensing via Proof-of-Data blockchain. IEEE Trans Mobile Comput 23(2):1016\u20131033","journal-title":"IEEE Trans Mobile Comput"},{"key":"577_CR9","doi-asserted-by":"crossref","unstructured":"Jin, Haiming, Lu Su, Klara Nahrstedt (2017) Theseus: Incentivizing truth discovery in mobile crowd sensing systems. In: Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. pp 1\u201310.","DOI":"10.1145\/3084041.3084063"},{"issue":"9","key":"577_CR10","doi-asserted-by":"publisher","first-page":"9503","DOI":"10.1109\/TII.2022.3228935","volume":"19","author":"M Li","year":"2023","unstructured":"Li M, Ma M, Wang L, Yang B, Wang T, Sun J (2023) Multitask-oriented collaborative crowdsensing based on reinforcement learning and blockchain for intelligent transportation system. IEEE Trans Indus Inf 19(9):9503\u20139514","journal-title":"IEEE Trans Indus Inf"},{"issue":"12","key":"577_CR11","first-page":"2414","volume":"43","author":"Y Liang","year":"2020","unstructured":"Liang Y, An J, Xianzhi H, Yang Q, Si H (2020) Research on privacy-preserving incentive mechanisms in mobile crowdsensing (in Chinese). Chinese J Comput 43(12):2414\u20132432","journal-title":"Chinese J Comput"},{"key":"577_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102480","author":"X Liu","year":"2021","unstructured":"Liu X, Zhang H, Dong S, Zhang Y (2021) Network defense decision-making based on a stochastic game system and a deep recurrent Q-network. Comput Secur. https:\/\/doi.org\/10.1016\/j.cose.2021.102480","journal-title":"Comput Secur"},{"key":"577_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA (2023) CICIOT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors Basel 23:5941","journal-title":"Sensors Basel"},{"key":"577_CR14","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/ad4e5e","volume":"26","author":"A Patra","year":"2024","unstructured":"Patra A, Sengupta S, Paul A, Chakraborty S (2024) Inferring to cooperate: evolutionary games with Bayesian inferential strategies. New J Phys 26:063003","journal-title":"New J Phys"},{"issue":"2020","key":"577_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.123240","volume":"540","author":"YS Rao","year":"2020","unstructured":"Rao YS, Keshri AK, Mishra BK, Panda TC (2020) Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: aA differential e-epidemic model. Physica A 540(2020):123240","journal-title":"Physica A"},{"issue":"2023","key":"577_CR16","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.dt.2022.10.008","volume":"27","author":"Z Ren","year":"2023","unstructured":"Ren Z, Zhang D, Tang S, Xiong W, Yang S-H (2023) Cooperative maneuver decision making for multi-UAV air combat based on incomplete information dynamic game. Defence Technol 27(2023):308\u2013317","journal-title":"Defence Technol"},{"key":"577_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108494","volume":"200","author":"YuPu Shengling Wang","year":"2021","unstructured":"Shengling Wang YuPu, Shi H, Huang J, Xiao Y (2021) A differential game view of antagonistic dynamics for cybersecurity. Comput Net 200:108494","journal-title":"Comput Net"},{"issue":"112634","key":"577_CR18","first-page":"0360","volume":"272","author":"R Shi","year":"2025","unstructured":"Shi R, Luo J, Zhou N, Liu Y, Hong C, Zhang X-P, Chen X (2025) Phy-APMR: A physics-informed air pollution map reconstruction approach with mobile crowd-sensing for fine-grained measurement. Build Environ 272(112634):0360\u20131323","journal-title":"Build Environ"},{"key":"577_CR19","first-page":"1","volume":"2020","author":"M Simsek","year":"2020","unstructured":"Simsek M, Kantarci B, Boukerche A (2020) Knowledge-based machine learning boosting for adversarial task detection in mobile crowdsensing. 2020 IEEE Symposium on Computers and Communications (ISCC). IEEE 2020:1\u20137","journal-title":"IEEE"},{"issue":"1","key":"577_CR20","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/JSYST.2021.3104107","volume":"16","author":"Y Sun","year":"2022","unstructured":"Sun Y, Ding W, Shu L, Li K, Zhang YU, Zhou Z (2022) On enabling mobile crowd sensing for data collection in smart agriculture: a vision. IEEE Syst J 16(1):132\u2013143","journal-title":"IEEE Syst J"},{"issue":"12","key":"577_CR21","doi-asserted-by":"publisher","first-page":"10340","DOI":"10.1109\/JIOT.2021.3122115","volume":"9","author":"H Wu","year":"2022","unstructured":"Wu H, Gao Q, Tao X, Zhang N, Chen D, Han Z (2022) Differential game approach for attack-defense strategy analysis in internet of things networks. IEEE Int Things J 9(12):10340\u201310353. https:\/\/doi.org\/10.1109\/JIOT.2021.3122115","journal-title":"IEEE Int Things J"},{"issue":"09","key":"577_CR22","first-page":"1949","volume":"44","author":"J Xiong","year":"2021","unstructured":"Xiong J, Wan B, Tian Y, Liu X (2021) Security and privacy in mobile crowd-sensing:models, progresses, and trend (in Chinese). Chinese Journal of Computers. 44(09):1949\u20131966","journal-title":"Chinese Journal of Computers."},{"key":"577_CR23","first-page":"5594697","volume":"1","author":"M Yan","year":"2021","unstructured":"Yan M, Hengwei Z, Hao H, Jinglei T, Jindong W (2021) Optimal network defense strategy selection method: a stochastic differential game model. Security Commun Net 1:5594697","journal-title":"Security Commun Net"},{"issue":"4","key":"577_CR24","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1109\/JSAC.2017.2676898","volume":"35","author":"S Yang","year":"2017","unstructured":"Yang S, Wu F, Tang S, Gao X, Yang B, Chen G (2017) On designing data quality-aware truth estimation and surplus sharing method for mobile crowdsensing. IEEE J Selected Areas Commun 35(4):832\u2013847","journal-title":"IEEE J Selected Areas Commun"},{"issue":"2024","key":"577_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120216","volume":"662","author":"P Yao","year":"2024","unstructured":"Yao P, Jiang Z, Yan B, Yang Q, Wang W (2024) Bayesian and stochastic game joint approach for Cross-Layer optimal defensive Decision-Making in industrial Cyber-Physical systems. Inf Sci 662(2024):120216","journal-title":"Inf Sci"},{"issue":"06","key":"577_CR26","first-page":"1428","volume":"46","author":"W Zhang","year":"2018","unstructured":"Zhang W, Li T, Huang S (2018) Network defense decision-making method based on attack-defense differential game (in Chinese). Acta Electron Sin 46(06):1428\u20131435","journal-title":"Acta Electron Sin"},{"issue":"2023","key":"577_CR27","doi-asserted-by":"publisher","first-page":"109635","DOI":"10.1016\/j.comnet.2023.109635","volume":"224","author":"H Zhang","year":"2023","unstructured":"Zhang H, Mi Y, Liu X, Zhang Y, Wang J, Tan J (2023a) A differential game approach for real-time security defense decision in scale-free networks. Comput Net 224(2023):109635","journal-title":"Comput Net"},{"issue":"2023","key":"577_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103187","volume":"129","author":"H Zhang","year":"2023","unstructured":"Zhang H, Mi Y, Yumeng F, Liu X, Zhang Y, Wang J, Tan J (2023b) Security defense decision method based on potential differential game for complex networks. Comput Secur 129(2023):103187","journal-title":"Comput Secur"},{"key":"577_CR29","doi-asserted-by":"crossref","unstructured":"Hengwei Zhang, Jinglei Tan, Xiaohu Liu, Jindong Wang (2020) Moving target defense decision-making method: a dynamic markov differential game model. In Proceedings of the 7th ACM Workshop on Moving Target Defense (MTD'20). Association for Computing Machinery, New York, NY, USA. Pp. 21\u201329.","DOI":"10.1145\/3411496.3421222"},{"key":"577_CR30","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.comcom.2023.05.017","volume":"207","author":"G Zhao","year":"2023","unstructured":"Zhao G, Gao M, Wang J (2023) A crowd cooperative defense model for mitigating DDoS attacks in mobile crowdsensing networks. Comput Commun 207:150\u2013163","journal-title":"Comput Commun"},{"issue":"111149","key":"577_CR31","first-page":"1389","volume":"261","author":"G Zhao","year":"2025","unstructured":"Zhao G, Li Z, Wang J (2025) Hybrid attacks collaborative defense model using an ensemble honey badger algorithm. Comput Netw 261(111149):1389\u20131286","journal-title":"Comput Netw"},{"issue":"4","key":"577_CR32","doi-asserted-by":"publisher","first-page":"2410","DOI":"10.1109\/TSMC.2022.3211866","volume":"53","author":"T Zhu","year":"2023","unstructured":"Zhu T, Ye D, Cheng Z, Zhou W, Yu PS (2023) Learning games for defending advanced persistent threats in cyber systems. IEEE Trans Syst, Man, and Cybernetics: Syst 53(4):2410\u20132422. https:\/\/doi.org\/10.1109\/TSMC.2022.3211866","journal-title":"IEEE Trans Syst, Man, and Cybernetics: Syst"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-026-00577-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-026-00577-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-026-00577-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T06:38:57Z","timestamp":1774334337000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-026-00577-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,24]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["577"],"URL":"https:\/\/doi.org\/10.1186\/s42400-026-00577-4","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,24]]},"assertion":[{"value":"24 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"143"}}