Abstract

The internal resource allocation approach is proposed for the information security of smart cities using the evolutionary game model. Focusing on the information resource allocation of smart cities, the relationship among information security factors is first analyzed, then the directed connection graph and adjacency matrix are constructed to obtain its directed hierarchical structure diagram by calculating the reachable matrix, thereby developing an explanatory structure model for information security resources in smart cities. Furthermore, an evolutionary game model is established, and the replicator dynamics are used to adjust the model. Finally, three types of typical problems are investigated through simulation experiments to verify and explain the structural model.

1. Introduction

As new technologies bring convenience during the process of building smart cities, there are also serious security risks, especially those related to information security. Therefore, the allocation of information resources, i.e., reasonable combination and allocation of information resources according to security requirements to achieve better security, has become an urgent issue to be solved.

The main works of this study can be summarized as follows: (1) the relationship among information security factors is analyzed, then the directed connection graph and adjacency matrix are constructed to obtain its directed hierarchical structure diagram by calculating the reachable matrix, (2) the evolutionary game model is established, and the replicator dynamics are used to adjust the model, and (3) three types of typical problems are investigated through simulation experiments to verify the proposed model.

The concept of smart cities is derived from the tenets of digital media: by utilizing various novel techniques or innovative concepts, smart cities aim to connect and integrate various systems and services in cities through the reasonable allocation of urban resources to optimize urban management and improve residents’ quality of life [15]. In a smart city, various novel technologies (such as the Internet of things (IoT), cloud computing, and virtual reality) are applied to different industries [68]. Furthermore, the city realizes the dynamically refined management and effectively improves residents’ quality of life by establishing ubiquitous broadband connectivity, integrating the application of intelligent technologies, implementing extensive resource sharing, and further attaining comprehensive and thorough enhanced ability and perception [911].

Smart cities have been valued by countries all over the world since they came into being; they provide more convenient conditions for people’s lives, while improving the intellectual capital of cities [1216]. As a smart city is highly dependent on some novel technical means such as cloud computing and IoT [1724], the hidden danger of diffusion of information risk accompanies the technical application. It brings impacts from different perspectives on urban information security [2530]. How best to allocate current urban resources and avoid the information security risk as far as possible to achieve the benefit maximization has been an inevitable practical problem faced by the healthy development of smart cities [3136].

3. Influencing Factors Analysis

3.1. Determination of Influencing Factors

According to the requirement on the internal resource allocation to information security in smart cities, the influencing factors are categorized into ten classes (technicians (), management system (), core equipment (), IoT equipment (), network equipment (), application systems (), outside environment (), data (), preventative measures (), and protective measures ()) through comprehensive analysis.

3.2. Analysis of Relationship of Various Influencing Factors

According to the investigation results based on the opinions of experts in the field, the relationship between the ten classes of factors is demonstrated in Figure 1.

The adjacency matrix of influencing factors can be established based on the above relationship. The matrix can express the connections between various influencing factors. According to the requirement of the interpretative structural model, the adjacency matrix of these ten classes of influencing factors () is displayed as in which and thus the element can be defined as follows:where, .

It can be seen from equation (1) that if the factors in the row directly influence those in the column, equals 1; otherwise, equals 0. As a result, the adjacency matrix of various influencing factors can be derived:

3.3. The Directed Graph and Interpretative Structural Model

Although the above adjacency matrix can depict the direct relationship between various influencing factors, it is difficult to reflect the indirect relationship between the factors. Therefore, it is necessary to undertake the corresponding transformation of the matrix, that is, the reachability matrix corresponding to the adjacency matrix is solved. The reachability matrix can clearly show the relationships of various influencing factors, whose solution process is as follows:(1)The sum of and unit matrix is calculated;(2)The power operation is successively conducted on until the output is constant, that is, and . In this case, the reachability matrix is .

During the power operation, it is worth noting that the power operation of the matrix should follow the operating rule of the Boolean matrix, that is, rather than ; other operating rules are the same as those of the numerical operation.

According to the above calculation process, it can be found that and when . Thus, the reachability matrix corresponding to the adjacency matrix is expressed as follows:

According to the reachability matrix, the influencing factors are divided into a reachable set and an antecedent set which are separately expressed as and In terms of the physical meaning, the reachable set refers to a set of units that the influencing factor can reach while the antecedent set represents a set of units that can reach . After solving the reachable and antecedent sets, the bottom units can be attained, whose antecedent set only contains themselves or the strongly correlated units at the same level and the reachable set contains the other units which they can reach apart from the previous units. Therefore, all bottom units should satisfy:

The data in the first hierarchy can be attained according to the above description, as shown in Table 1, where the bottom units that satisfy the condition are expressed as . Therefore, it can be found that application systems and data are the most direct factors influencing the information security of smart cities and they should be placed in the first hierarchy. According to the aforementioned method, the factors influencing the information security of smart cities in the second hierarchy are determined as after eliminating and . In this way, the influencing factors in the third and fourth hierarchies are separately displayed as and . By redistributing Figure 1 according to the above hierarchy, Figure 2 can be attained: this shows the interpretative structural model for factors influencing information security in smart cities. It can be clearly found that the relationships and physical meanings of various influencing factors are quite clear on the condition that the factors are sorted according to the hierarchy.

3.4. Analysis of Hierarchical Relationship

Based on Figure 2, it is found that there are four hierarchies in the interpretative structural model for factors influencing the internal resource allocation to information security in smart cities. Moreover, application systems and data are the most direct and fundamental factors influencing the information security of smart cities while the other factors are all taken as being indirect as they are either superficial or specific factors. Practice also proves that data and application systems are more vulnerable to illegal users, so the whole information system is not safe. Therefore, seemingly, the information security of smart cities depends on the game between illegal users and the urban information security system; it is a game of illegal users with the allocation of protective resources to data and application systems. In addition, the application systems and data are also influenced by IoT equipment , network equipment , preventative measures , protective measures , and core equipment ; the preventative measures and protective measures are limited by the expertise of technicians and the management system ; moreover, the outside environment also exerts a certain influence on the IoT equipment , network equipment , and core equipment . Due to the rapid development of some novel technologies including big data, cloud computing, and virtual reality, it is possible to realize cross-industry, cross-field, and cross-city data integration; however, this triggers new threats to the data; various urban application systems successively emerge, which bring convenience to people’s lives while increasing the difficulty in information security protection. Thus, more attention should be paid to data and application systems in terms of the internal resource allocation in smart cities.

The 2nd to 4th hierarchies of the interpretative structural model are easily perceived: they are indirect or specific factors influencing the internal resource allocation to information security in smart cities. In terms of hardware facilities, it is evident that the core equipment, IoT equipment and network equipment can all influence the internal resource allocation to information security in smart cities. If hardware facilities are damaged, the communications and data interchange are possibly affected, even the information security and capital safety of the whole city. In terms of the defensive measures, the preventative measures, protective measures, technicians, and management systems play an important role, which are important driving forces determining internal resource allocation to information security in smart cities. With the construction of smart cities, China’s network and informatization levels are increasing; more basic work relies on information security and assurance and cities become increasingly inclusive. The better the defensive measures, the higher the level of information security. This can prevent cities from suffering huge loss, so leaders in cities are more willing to invest resources in information security. In addition, the external environment also exerts a significant influence on the safety of hardware facilities. If the workshops where facilities are placed are vulnerable to damage, for example, by earthquake, fire, or flood, the hardware facilities may fail to fulfill their intended functions. This greatly affects the data and application systems of cities, thus influencing urban information security.

According to the interpretative structural model for influencing factors of the internal resource allocation to information security in smart cities, it can be found that the application systems and data are the most direct factors influencing the information security of the smart cities. They are also fundamental factors influencing the internal resource allocation to information security in smart cities. Therefore, analysis of the relational structure of factors influencing the internal resource allocation to urban information security is regarded as the premise for exploring the internal resource allocation to information security in smart cities. Through comprehensive analysis, a proper interpretative structural model is established, which provides a basis for subsequent research on the model for internal resource allocation to information security in smart cities.

4. Evolutionary Game Model

4.1. Basic Assumptions

Assumption 1. It is supposed that a smart city is a closed system and does not share or exchange any other resource with the external environment.

Assumption 2. The evolutional game process is dynamically interactive. The game participants can adjust their own strategies by observing and learning from the strategies of the other participants; through constant observation and adjustment, the strategy equilibrium is finally realized.

Assumption 3. All game participants are boundedly rational. Compared with the full rationality of the participants in the traditional game models, the evolutionary game model belongs to a dynamic process. The game participants only master part of others’ revenues on condition of the formulated strategy. In this case, they constantly adjust strategies to pursue revenue maximization, which conforms to actual conditions.

Assumption 4. The game process is fair. The participants constantly adjust their own strategies until reaching evolutionary equilibrium in the process of the evolutionary game. Under the evolutionary equilibrium, they select different strategies while attaining the same revenue, thus realizing a state of fairness.

Assumption 5. All resources of the city are transformed into funds and then measured; the internal resource allocation problem is converted into the fund allocation problem; the internal resources allocated to urban information security are converted into the total funding .

4.2. Problem Modelling

A game problem can be transformed into a mathematical expression .

The internal resource allocation to information security in smart cities is mainly influenced by factors including technicians, the management system, core equipment, IoT equipment, network equipment, application systems, outside environment, data, and preventative and protective measures. The data and application systems show the most direct influence. In this section, only the data and application systems are taken as examples and analyzed (other influencing factors deliver a similar result). Therefore, the problem concerning the internal resource allocation to information security in a smart city can be transformed into the fund allocation problem to data and application systems.Game participants: the total amount of funds can be divided into equal parts, each of which makes up a game participant. represents a set of the game participants. Moreover, it is supposed that the decision-making of each game participant is independent before adjustment. When adjusting the decision-making, it is necessary to adjust their own strategy according to the decision-makings of the other participants.Populations: A population comprises the set of game participants in the process of an evolutionary game, which is expressed as .The set of strategies: The number of strategies is the same as that of influencing factors. Thus, the set of strategies can be expressed as . In the case of only considering data and application systems, . That is, the game participants select to invest in the data and application systems . The two influencing factors make up a set of strategies, which is shown as .The population ratio: This refers to the ratio of the number of game participants who select a certain strategy in the population to the total population, i.e. , in which and denotes the number of game participants who select a strategy . Obviously, .The population state: This means the set of population ratios corresponding to all selected strategies. That is, represents all possible population states in the problem model.Loss function: Each game participant is a rational person and selects their access strategies through different losses. In the game process, the loss function of the game participants is defined as the sum of the actual loss caused by the invasion of illegal users and the invested fund. The game participants aim to minimize their loss function when selecting a strategy.

According to its definition, it is found that the population ratio means the probability that game participants invest in the influencing factor. It is supposed that the city government invests funds in the influencing factor and the loss reduced by unit funding is ; the probability that the influencing factor is affected by illegal users is set to and the probability that cities are invaded by illegal users when no funds are invested in the influencing factor of information security is ; moreover, the loss caused by the intrusion of illegal users is expressed as . According to the model proposed by Gordon [33] and the current assumptions, the model is improved. On this basis, the probability that data are directly invaded by illegal users is . Therefore, smart cities aim to minimize their expected cost after being invaded. Furthermore, the loss function of smart cities can be deduced as follows:where the constraint is such that .

By introducing equation (5) and the constraint into the Lagrange multiplier, it can be attained that:

Partial differentiation of equation (6) gives:

By calculating the second-order partial derivative of equation (6), it is found that:

It can be seen from equation (8) that is always valid. Thus, the minimum of the loss function is found at and . As a result, it is found that the loss of smart cities is the minimum when the Nash equilibrium solution of the problem is calculated as , in which satisfies equation (7).

The set of strategies in the smart cities only considering the influences of data and application systems contains two strategies. That is, the game participants select to invest in the data and application systems . The two strategies make up a set () of strategies. It is supposed that the probabilities that the game participants invest in data and application software are and , respectively, and thus . It is supposed that the losses reduced per unit funding invested in data and application software are expressed as and ; the probabilities that cities are invaded by illegal users when no funds are invested in the data and application software influencing information security are separately expressed as and ; the losses caused by invasion to data and application software are and . According to the previous description, the probabilities that data and application software are directly invaded by illegal users are and , respectively. Therefore, smart cities aim to minimize their expected cost after being invaded. Furthermore, the loss function of smart cities can be deduced as follows.

It can be seen that is always established and therefore the minimum of the loss function appears at . Hence, the Nash equilibrium solution of the problem can be attained as , in which and satisfy equation:

On condition that the funds invested in data and application software are and , the loss of smart cities is minimized, thus resulting in optimal benefit.

5. Experimental Results and Analysis

Based on the simulation test, it is feasible to analyze the internal resource allocation of a smart city and further obtain the final resource allocation. Through numerical analysis, the correlation analysis is separately conducted on various influencing factors, thus acquiring the optimal resource allocation.

Diverse conditions will occur during the practical construction of a smart city and it is impossible to list and analyze all conditions. Thus, only three typical conditions are analyzed: (1) only considering different probabilities that a city is invaded by illegal users when no funds are invested in the information security, that is, only considering the influences of and ; (2) only considering different losses caused by invasion of illegal users in the city, that is, only considering the influences of and ; (3) only considering different losses reduced by the unit fund of the city after investing funds in influencing factors, that is, only considering the influences of and .

5.1. Influences of Factors and

It is supposed that the other parameters are kept the same and only the results induced by different probabilities that a city is affected by illegal users when no funds are invested in information security are analyzed. That is, the different results under different values of and are considered.

The influence of investing funds in the data is slightly better than investing in the application software in actual conditions. Considering this, it is supposed that the losses reduced by separately investing 0.1 billion CNY in data and application software in smart cities are million CNY and million CNY. It is supposed that the probabilities of being affected by illegal users are both 0.5. The losses caused by such illegal use of the data and application software are billion CNY and billion CNY. The total invested funds equal 10 billion CNY.

According to equation (9), the Nash equilibrium solutions and expected losses under different values of and can be calculated, as shown in Table 2.

The values of and are within and therefore the expected losses of smart cities are as shown in Figure 3.

According to Table 2 and Figure 3, the following conclusions can be drawn:(1)When fixing the probability of invasion of illegal users to one influencing factor, the expected loss of smart cities shows a positive correlation with the probability of invasion to the other factor. That is, the higher the probability of invasion by illegal users when no funds are invested in information security is, the larger the expected loss to these smart cities. It implies that the influencing factor shows a great importance in urban resource allocation. Therefore, it is necessary to increase the resources allocated to the influencing factors with a high probability of invasion; on the contrary, the lower the probability of being invaded by illegal users when no funds are invested in information security, the lower the expected loss to cities. This indicates that the influencing factor is less important in urban resource allocation and investment therein can be slightly reduced.(2)When influencing factors have similar probabilities of being invaded, the expected loss of cities is low only when the levels of the resource allocation to the factors are also similar.

5.2. Influences of Factors and

As shown in equation (9), the influences of and are similar to those of and . Therefore, only one factor is analyzed. It is supposed that the other parameters remain unchanged. The results of different losses caused by the invasion of illegal users in smart cities are only investigated. That is, the different results under different values of and are analyzed.

The influence of investing funds in the data is better than investing in the application software in actual conditions. Considering this, it is supposed that the losses reduced by separately investing 0.1 billion CNY in data and application software in smart cities are million CNY and million CNY. It is supposed that the probabilities of being invaded by illegal users are both 0.5. The probabilities that cities are invaded by illegal users when no funds are invested in data and application software influencing the information security are separately shown as and . The total invested funding is 10 billion CNY.

According to equation (10), the Nash equilibrium solutions and expected losses under different values of and can be solved, as shown in Table 3.

By analyzing Table 3 and Figure 4, the following conclusions can be drawn: (1)When fixing the loss caused by invasion to one influencing factor, the expected loss of cities is positively correlated with that triggered by invasion to the other factor. That is, the greater the loss caused by the invasion of illegal users in cities, the greater the expected loss, therefore, it is essential to increase the resources allocated to the influencing factor which is invaded and results in the largest loss; on the contrary, the lower the loss caused by invasion of illegal users in cities, the lower the expected loss. This indicates that the influencing factor is less important to urban resource allocation and investment therein can be slightly reduced.(2)In the case that the losses caused by invasion are similar across influencing factors, the resource allocation to each factor remains the same. That is, the influencing factors do not affect the resource allocation to information security in cities provided the losses caused by invasion are equivalent across each factor.

5.3. Influences of Factors and

It is supposed that the other parameters remain unchanged and only the results of different losses reduced by the city government investing 0.1 billion CNY in influencing factors are studied. That is, different results under different values of and are explored.

It is supposed that the probabilities of being invaded by illegal users are both 0.5. The probabilities that a smart city is invaded by illegal users when no funds are invested in data and application software influencing the information security are separately shown as and . The losses caused by the invasion of the data and application software are billion CNY and billion CNY. The total funding invested is a billion CNY.

According to equation (10), the Nash equilibrium solutions and expected losses under different values of and are calculated, as shown in Table 4.

By analyzing Table 4 and Figure 5, the following conclusions can be drawn:(1)In the case of fixing the loss reduced by investing in one influencing factor, the expected loss of cities is negatively correlated with the loss reduced by investing in the other factor. That is, the greater the loss reduced by unit fund invested in influencing factors, the lower the expected loss from the cities. It implies that the influencing factor is less important to urban resource allocation and investment therein can be decreased slightly; on the contrary, the lower the loss reduced by unit fund invested in an influencing factor is, the larger the expected loss. This indicates that the influencing factor is of great importance to urban resource allocation and it is essential to increase the resource allocated thereto, provided the loss reduced per unit funding is low.(2)On the condition of fixing the probabilities that the data and application software are invaded by illegal users and keeping , the investment in the data is always low while in the application software is large in terms of the overall expectation of the resource allocation regardless of changes of the loss reduced by unit fund invested by cities in influencing factors.

6. Conclusion

The relationship between various factors is analyzed based on factors influencing the information security of smart cities. On this basis, a four-hierarchy interpretative structural model for urban resources influencing information security is established. The data and application software in the first hierarchy of the structural model are explored. According to the actual condition, some assumptions are proposed to establish the corresponding evolutional game model; according to the actual condition in the first hierarchy of the interpretative structural model, the Nash equilibrium solutions when considering the influences of data and application systems are derived. Subsequently, the three types of typical problems in an actual situation are analyzed to verify the effectiveness of the structural model, and the correctness of its derivation is ascertained.

Some future works can be summarized as follows: (1) more typical scenarios can be developed and verify the effectiveness of this proposed method, and (2) more recently published methods can be compared with the proposed method, and furtherly improved the proposed method.

Data Availability

All the data used in this paper can be obtained from the corresponding author (e-mail: xinglining@gmail.com).

Conflicts of Interest

The authors declare that there are no conflicts of interest.

Authors’ Contributions

Li, Zou, and Xing jointly proposed the overall research plan. Li established the proposed method, implemented case study, and analyzed the data under the supervision of Zou and Xing. The manuscript was drafted by Li, revised, and proofread by Zou and Xing. All authors have read and agreed to the published version of the manuscript.

Acknowledgments

This research work was supported by the National Social Science Fund of China (Grand No. 18BTQ055), the Hunan Provincial Innovation Foundation for Postgraduate (Grand No. CX20200585), and the Innovation Team of Guangdong Provincial Department of Education (Grand No. 2018KCXTD031).