Skip to main content
Top
Published in: The Journal of Supercomputing 14/2023

21-04-2023

Dynamic stochastic game-based security of edge computing based on blockchain

Authors: Haoyu Wang, Jianwei An

Published in: The Journal of Supercomputing | Issue 14/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As a rising technology in recent years, edge computing has the characteristics of low latency and low energy consumption, which makes it possible for intelligent interconnection of things based on the Internet of Things(IoT) to meet people’s intelligent service needs anytime and anywhere. However, due to its wide geographical distribution, limited node resources, and vulnerability to network attacks, the operating environment of edge computing systems is in jeopardy, and user data privacy disclosure, malicious data tampering, identity authentication, and other security issues are increasingly prominent. As a distributed data-sharing technology, blockchain’s hash encryption transmission, consensus mechanism, and other characteristics determine that it has tamper-proof and traceable performance characteristics, which can well solve the security problems in edge computing systems. Although there have been quite many studies on the application of blockchain technology to the edge computing-enabled IoT system, there has been no systematic and mathematical research and analysis on the security mechanism of the blockchain technology architecture itself. From the perspective of relative security in the field of information security, this paper uses stochastic differential game theory to model the gains of both attack and defense sides under the edge computing system based on blockchain technology and obtain the Nash equilibrium solution. Runge–Kutta algorithm is used to solve the numerical solution of the revenue game model of both sides. From the perspective of architecture theory, it discusses and studies the security characteristics brought by blockchain technology architecture itself. Through simulation comparison with relevant research work and existing baseline scheme, the simulation results show the effectiveness and superiority of our proposed scheme. At the same time, the difficulty coefficient and block size are also revealed as security factors in systems based on blockchain technology.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Liao Z, Pang X, Zhang J et al (2021) Blockchain on security and forensics management in edge computing for iot: a comprehensive survey[J]. IEEE Trans Netw Service Manag 19(2):1159–1175CrossRef Liao Z, Pang X, Zhang J et al (2021) Blockchain on security and forensics management in edge computing for iot: a comprehensive survey[J]. IEEE Trans Netw Service Manag 19(2):1159–1175CrossRef
3.
go back to reference Boyes H, Hallaq B, Cunningham J et al (2018) The industrial internet of things (IIoT): an analysis framework[J]. Comput Ind 101:1–12CrossRef Boyes H, Hallaq B, Cunningham J et al (2018) The industrial internet of things (IIoT): an analysis framework[J]. Comput Ind 101:1–12CrossRef
4.
go back to reference Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT[J]. J Netw Comput Appl 149:102481CrossRef Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT[J]. J Netw Comput Appl 149:102481CrossRef
5.
go back to reference Ang LM, Seng KP, Ijemaru GK et al (2018) Deployment of IoV for smart cities: applications, architecture, and challenges[J]. IEEE Access 7:6473–6492CrossRef Ang LM, Seng KP, Ijemaru GK et al (2018) Deployment of IoV for smart cities: applications, architecture, and challenges[J]. IEEE Access 7:6473–6492CrossRef
6.
go back to reference Omitaomu OA, Niu H (2021) Artificial intelligence techniques in smart grid: a survey[J]. Smart Cities 4(2):548–568CrossRef Omitaomu OA, Niu H (2021) Artificial intelligence techniques in smart grid: a survey[J]. Smart Cities 4(2):548–568CrossRef
7.
go back to reference Zantalis F, Koulouras G, Karabetsos S et al (2019) A review of machine learning and IoT in smart transportation[J]. Future Internet 11(4):94CrossRef Zantalis F, Koulouras G, Karabetsos S et al (2019) A review of machine learning and IoT in smart transportation[J]. Future Internet 11(4):94CrossRef
8.
go back to reference Haque AKMB, Bhushan B, Dhiman G (2022) Conceptualizing smart city applications: requirements, architecture, security issues, and emerging trends[J]. Exp Syst 39(5):e12753 Haque AKMB, Bhushan B, Dhiman G (2022) Conceptualizing smart city applications: requirements, architecture, security issues, and emerging trends[J]. Exp Syst 39(5):e12753
9.
go back to reference Ali MS, Vecchio M, Antonelli F (2018) Enabling a blockchain-based IoT edge[J]. IEEE Internet Things Mag 1(2):24–29CrossRef Ali MS, Vecchio M, Antonelli F (2018) Enabling a blockchain-based IoT edge[J]. IEEE Internet Things Mag 1(2):24–29CrossRef
10.
go back to reference Yazdinejad A, Parizi RM, Dehghantanha A et al (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security[J]. IEEE Trans Serv Comput 13(4):625–638CrossRef Yazdinejad A, Parizi RM, Dehghantanha A et al (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security[J]. IEEE Trans Serv Comput 13(4):625–638CrossRef
11.
go back to reference Ejaz W, Anpalagan A (2019) Blockchain technology for security and privacy in internet of things. Internet of things for smart cities. Springer, Cham, pp 47–55CrossRef Ejaz W, Anpalagan A (2019) Blockchain technology for security and privacy in internet of things. Internet of things for smart cities. Springer, Cham, pp 47–55CrossRef
12.
go back to reference Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375CrossRef Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375CrossRef
13.
go back to reference Qu Q, Xu R, Chen Y et al (2021) Enable fair proof-of-work (PoW) consensus for blockchains in IoT by miner twins (MinT)[J]. Future Internet 13(11):291CrossRef Qu Q, Xu R, Chen Y et al (2021) Enable fair proof-of-work (PoW) consensus for blockchains in IoT by miner twins (MinT)[J]. Future Internet 13(11):291CrossRef
14.
go back to reference Gaži P, Kiayias A, Russell A (2018) Stake-bleeding attacks on proof-of-stake blockchains. In 2018 Crypto Valley conference on Blockchain technology (CVCBT). IEEE, pp 85-92 Gaži P, Kiayias A, Russell A (2018) Stake-bleeding attacks on proof-of-stake blockchains. In 2018 Crypto Valley conference on Blockchain technology (CVCBT). IEEE, pp 85-92
15.
go back to reference Yang F, Zhou W, Wu QQ et al (2019) Delegated proof of stake with downgrade: a secure and efficient blockchain consensus algorithm with downgrade mechanism[J]. IEEE Access 7:118541–118555CrossRef Yang F, Zhou W, Wu QQ et al (2019) Delegated proof of stake with downgrade: a secure and efficient blockchain consensus algorithm with downgrade mechanism[J]. IEEE Access 7:118541–118555CrossRef
17.
go back to reference Gupta D, Wadhwa S, Moudgil A (2021) Deploying blockchain based security solutions for vehicular edge computing networks. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO). IEEE, pp 1-5 Gupta D, Wadhwa S, Moudgil A (2021) Deploying blockchain based security solutions for vehicular edge computing networks. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO). IEEE, pp 1-5
18.
go back to reference Misra S, Mukherjee A, Roy A et al (2020) Blockchain at the edge: performance of resource-constrained IoT networks[J]. IEEE Trans Parallel Distrib Syst 32(1):174–183CrossRef Misra S, Mukherjee A, Roy A et al (2020) Blockchain at the edge: performance of resource-constrained IoT networks[J]. IEEE Trans Parallel Distrib Syst 32(1):174–183CrossRef
19.
go back to reference Wang Q, Guo Y, Wang X et al (2020) AI at the edge: blockchain-empowered secure multiparty learning with heterogeneous models[J]. IEEE Internet of Things J 7(10):9600–9610CrossRef Wang Q, Guo Y, Wang X et al (2020) AI at the edge: blockchain-empowered secure multiparty learning with heterogeneous models[J]. IEEE Internet of Things J 7(10):9600–9610CrossRef
20.
go back to reference Zhang K, Zhu Y, Maharjan S et al (2019) Edge intelligence and blockchain empowered 5G beyond for the industrial Internet of Things[J]. IEEE Network 33(5):12–19CrossRef Zhang K, Zhu Y, Maharjan S et al (2019) Edge intelligence and blockchain empowered 5G beyond for the industrial Internet of Things[J]. IEEE Network 33(5):12–19CrossRef
21.
go back to reference Lin C, He D, Huang X et al (2020) BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 22(12):7408–7420CrossRef Lin C, He D, Huang X et al (2020) BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 22(12):7408–7420CrossRef
22.
go back to reference Guo F, Yu FR, Zhang H et al (2019) Adaptive resource allocation in future wireless networks with blockchain and mobile edge computing[J]. IEEE Trans Wirel Commun 19(3):1689–1703CrossRef Guo F, Yu FR, Zhang H et al (2019) Adaptive resource allocation in future wireless networks with blockchain and mobile edge computing[J]. IEEE Trans Wirel Commun 19(3):1689–1703CrossRef
23.
go back to reference Xu D, Xiao L, Sun L et al (2017) Game theoretic study on blockchain based secure edge networks. In 2017 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, pp 1-5 Xu D, Xiao L, Sun L et al (2017) Game theoretic study on blockchain based secure edge networks. In 2017 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, pp 1-5
24.
go back to reference Wang H, Wang L, Zhou Z et al (2019) Blockchain-based resource allocation model in fog computing[J]. Appl Sci 9(24):5538CrossRef Wang H, Wang L, Zhou Z et al (2019) Blockchain-based resource allocation model in fog computing[J]. Appl Sci 9(24):5538CrossRef
25.
go back to reference Karabacak B, Sogukpinar I (2005) ISRAM: information security risk analysis method[J]. Comput Secur 24(2):147–159CrossRef Karabacak B, Sogukpinar I (2005) ISRAM: information security risk analysis method[J]. Comput Secur 24(2):147–159CrossRef
27.
go back to reference Yeung DWK, Petrosyan LA (2006) Cooperative stochastic differential games[M]. Springer, New YorkMATH Yeung DWK, Petrosyan LA (2006) Cooperative stochastic differential games[M]. Springer, New YorkMATH
28.
go back to reference Sivasangari A, Sonti VJKK, Ajitha P et al (2022) Integrated security framework for healthcare using blockchain and fog computing. In 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC). IEEE, pp 1-5 Sivasangari A, Sonti VJKK, Ajitha P et al (2022) Integrated security framework for healthcare using blockchain and fog computing. In 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC). IEEE, pp 1-5
29.
go back to reference He Y, Wang Y, Qiu C et al (2020) Blockchain-based edge computing resource allocation in IoT: a deep reinforcement learning approach[J]. IEEE Internet Things J 8(4):2226–2237CrossRef He Y, Wang Y, Qiu C et al (2020) Blockchain-based edge computing resource allocation in IoT: a deep reinforcement learning approach[J]. IEEE Internet Things J 8(4):2226–2237CrossRef
30.
go back to reference Ren J, Li J, Liu H et al (2021) Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT[J]. Tsinghua Sci Technol 27(4):760–776CrossRef Ren J, Li J, Liu H et al (2021) Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT[J]. Tsinghua Sci Technol 27(4):760–776CrossRef
31.
go back to reference Guo F, Yu FR, Zhang H et al (2019) Adaptive resource allocation in future wireless networks with blockchain and mobile edge computing[J]. IEEE Trans Wirel Commun 19(3):1689–1703CrossRef Guo F, Yu FR, Zhang H et al (2019) Adaptive resource allocation in future wireless networks with blockchain and mobile edge computing[J]. IEEE Trans Wirel Commun 19(3):1689–1703CrossRef
Metadata
Title
Dynamic stochastic game-based security of edge computing based on blockchain
Authors
Haoyu Wang
Jianwei An
Publication date
21-04-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 14/2023
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05289-x

Other articles of this Issue 14/2023

The Journal of Supercomputing 14/2023 Go to the issue

Premium Partner