Skip to main content
Log in

Dynamic stochastic game-based security of edge computing based on blockchain

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

As a rising technology in recent years, edge computing has the characteristics of low latency and low energy consumption, which makes it possible for intelligent interconnection of things based on the Internet of Things(IoT) to meet people’s intelligent service needs anytime and anywhere. However, due to its wide geographical distribution, limited node resources, and vulnerability to network attacks, the operating environment of edge computing systems is in jeopardy, and user data privacy disclosure, malicious data tampering, identity authentication, and other security issues are increasingly prominent. As a distributed data-sharing technology, blockchain’s hash encryption transmission, consensus mechanism, and other characteristics determine that it has tamper-proof and traceable performance characteristics, which can well solve the security problems in edge computing systems. Although there have been quite many studies on the application of blockchain technology to the edge computing-enabled IoT system, there has been no systematic and mathematical research and analysis on the security mechanism of the blockchain technology architecture itself. From the perspective of relative security in the field of information security, this paper uses stochastic differential game theory to model the gains of both attack and defense sides under the edge computing system based on blockchain technology and obtain the Nash equilibrium solution. Runge–Kutta algorithm is used to solve the numerical solution of the revenue game model of both sides. From the perspective of architecture theory, it discusses and studies the security characteristics brought by blockchain technology architecture itself. Through simulation comparison with relevant research work and existing baseline scheme, the simulation results show the effectiveness and superiority of our proposed scheme. At the same time, the difficulty coefficient and block size are also revealed as security factors in systems based on blockchain technology.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27

Similar content being viewed by others

Data availability

The data sets supporting the results of this article are included within the article and its additional files.

References

  1. Liao Z, Pang X, Zhang J et al (2021) Blockchain on security and forensics management in edge computing for iot: a comprehensive survey[J]. IEEE Trans Netw Service Manag 19(2):1159–1175

    Article  Google Scholar 

  2. The Mobile Economy (2020) GSMA Assoc., London, U.K., 2019. [Online]. Available: https://www.gsma.com/

  3. Boyes H, Hallaq B, Cunningham J et al (2018) The industrial internet of things (IIoT): an analysis framework[J]. Comput Ind 101:1–12

    Article  Google Scholar 

  4. Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT[J]. J Netw Comput Appl 149:102481

    Article  Google Scholar 

  5. Ang LM, Seng KP, Ijemaru GK et al (2018) Deployment of IoV for smart cities: applications, architecture, and challenges[J]. IEEE Access 7:6473–6492

    Article  Google Scholar 

  6. Omitaomu OA, Niu H (2021) Artificial intelligence techniques in smart grid: a survey[J]. Smart Cities 4(2):548–568

    Article  Google Scholar 

  7. Zantalis F, Koulouras G, Karabetsos S et al (2019) A review of machine learning and IoT in smart transportation[J]. Future Internet 11(4):94

    Article  Google Scholar 

  8. Haque AKMB, Bhushan B, Dhiman G (2022) Conceptualizing smart city applications: requirements, architecture, security issues, and emerging trends[J]. Exp Syst 39(5):e12753

    Google Scholar 

  9. Ali MS, Vecchio M, Antonelli F (2018) Enabling a blockchain-based IoT edge[J]. IEEE Internet Things Mag 1(2):24–29

    Article  Google Scholar 

  10. Yazdinejad A, Parizi RM, Dehghantanha A et al (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security[J]. IEEE Trans Serv Comput 13(4):625–638

    Article  Google Scholar 

  11. Ejaz W, Anpalagan A (2019) Blockchain technology for security and privacy in internet of things. Internet of things for smart cities. Springer, Cham, pp 47–55

    Chapter  Google Scholar 

  12. Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375

    Article  Google Scholar 

  13. Qu Q, Xu R, Chen Y et al (2021) Enable fair proof-of-work (PoW) consensus for blockchains in IoT by miner twins (MinT)[J]. Future Internet 13(11):291

    Article  Google Scholar 

  14. Gaži P, Kiayias A, Russell A (2018) Stake-bleeding attacks on proof-of-stake blockchains. In 2018 Crypto Valley conference on Blockchain technology (CVCBT). IEEE, pp 85-92

  15. Yang F, Zhou W, Wu QQ et al (2019) Delegated proof of stake with downgrade: a secure and efficient blockchain consensus algorithm with downgrade mechanism[J]. IEEE Access 7:118541–118555

    Article  Google Scholar 

  16. Gartner Hype Cycle.[Online]. (2022) Available: https://www.gartner.com/

  17. Gupta D, Wadhwa S, Moudgil A (2021) Deploying blockchain based security solutions for vehicular edge computing networks. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO). IEEE, pp 1-5

  18. Misra S, Mukherjee A, Roy A et al (2020) Blockchain at the edge: performance of resource-constrained IoT networks[J]. IEEE Trans Parallel Distrib Syst 32(1):174–183

    Article  Google Scholar 

  19. Wang Q, Guo Y, Wang X et al (2020) AI at the edge: blockchain-empowered secure multiparty learning with heterogeneous models[J]. IEEE Internet of Things J 7(10):9600–9610

    Article  Google Scholar 

  20. Zhang K, Zhu Y, Maharjan S et al (2019) Edge intelligence and blockchain empowered 5G beyond for the industrial Internet of Things[J]. IEEE Network 33(5):12–19

    Article  Google Scholar 

  21. Lin C, He D, Huang X et al (2020) BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 22(12):7408–7420

    Article  Google Scholar 

  22. Guo F, Yu FR, Zhang H et al (2019) Adaptive resource allocation in future wireless networks with blockchain and mobile edge computing[J]. IEEE Trans Wirel Commun 19(3):1689–1703

    Article  Google Scholar 

  23. Xu D, Xiao L, Sun L et al (2017) Game theoretic study on blockchain based secure edge networks. In 2017 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, pp 1-5

  24. Wang H, Wang L, Zhou Z et al (2019) Blockchain-based resource allocation model in fog computing[J]. Appl Sci 9(24):5538

    Article  Google Scholar 

  25. Karabacak B, Sogukpinar I (2005) ISRAM: information security risk analysis method[J]. Comput Secur 24(2):147–159

    Article  Google Scholar 

  26. PoW 51% Attack Cost.[Online]. Available: https://www.crypto51.app/

  27. Yeung DWK, Petrosyan LA (2006) Cooperative stochastic differential games[M]. Springer, New York

    MATH  Google Scholar 

  28. Sivasangari A, Sonti VJKK, Ajitha P et al (2022) Integrated security framework for healthcare using blockchain and fog computing. In 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC). IEEE, pp 1-5

  29. He Y, Wang Y, Qiu C et al (2020) Blockchain-based edge computing resource allocation in IoT: a deep reinforcement learning approach[J]. IEEE Internet Things J 8(4):2226–2237

    Article  Google Scholar 

  30. Ren J, Li J, Liu H et al (2021) Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT[J]. Tsinghua Sci Technol 27(4):760–776

    Article  Google Scholar 

  31. Guo F, Yu FR, Zhang H et al (2019) Adaptive resource allocation in future wireless networks with blockchain and mobile edge computing[J]. IEEE Trans Wirel Commun 19(3):1689–1703

    Article  Google Scholar 

Download references

Funding

There is no funding support in this article.

Author information

Authors and Affiliations

Authors

Contributions

HW wrote the main manuscript text and JA prepared figures 1–3. All authors reviewed the manuscript.

Corresponding authors

Correspondence to Haoyu Wang or Jianwei An.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing interests or personal relationships that could have appeared to influence the work reported in this paper.

Ethical Approval

This article does not cover human or animal research.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, H., An, J. Dynamic stochastic game-based security of edge computing based on blockchain. J Supercomput 79, 15894–15926 (2023). https://doi.org/10.1007/s11227-023-05289-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05289-x

Keywords

Navigation