Skip to main content
Log in

Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

In order to protect the privacy and data security of mobile devices during the transactions in the industrial Internet of Things (IIoT), we propose a mobile edge computing (MEC)-based mobile blockchain framework by considering the limited bandwidth and computing power of small base stations (SBSs). First, we formulate a joint bandwidth and computing resource allocation problem to maximize the long-term utility of all mobile devices, and take into account the mobility of devices as well as the blockchain throughput. We decompose the formulated problem into two subproblems to decrease the dimension of action space. Then, we propose a deep reinforcement learning additional particle swarm optimization (DRPO) algorithm to solve the two subproblems, in which a particle swarm optimization algorithm is leveraged to avoid the unnecessary search of a deep deterministic policy gradient approach. Simulation results demonstrate the effectiveness of our method from various aspects.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ning Z, Dong P, Wang X, et al. Partial computation offloading and adaptive task scheduling for 5G-enabled vehicular networks. IEEE Trans Mobile Comput, 2020. doi: https://doi.org/10.1109/TMC.2020.3025116

  2. Xu L D, He W, Li S. Internet of Things in industries: a survey. IEEE Trans Ind Inf, 2014, 10: 2233–2243

    Article  Google Scholar 

  3. Ning Z, Dong P, Wang X, et al. Mobile edge computing enabled 5G health monitoring for Internet of Medical Things: a decentralized game theoretic approach. IEEE J Sel Areas Commun, 2021, 39: 463–478

    Article  Google Scholar 

  4. Liu D, Alahmadi A, Ni J, et al. Anonymous reputation system for IIoT-enabled retail marketing atop PoS blockchain. IEEE Trans Ind Inf, 2019, 15: 3527–3537

    Article  Google Scholar 

  5. Wang X, Ning Z, Zhou M C, et al. Privacy-preserving content dissemination for vehicular social networks: challenges and solutions. IEEE Commun Surv Tut, 2019, 21: 1314–1345

    Article  Google Scholar 

  6. Yu Y, Ning Z L, Guo L. A secure routing scheme based on social network analysis in wireless mesh networks. Sci China Inf Sci, 2016, 59: 122310

    Article  Google Scholar 

  7. Yang Z, Yang K, Lei L, et al. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J, 2019, 6: 1495–1505

    Article  Google Scholar 

  8. Ali M S, Vecchio M, Pincheira M, et al. Applications of blockchains in the Internet of Things: a comprehensive survey. IEEE Commun Surv Tut, 2019, 21: 1676–1717

    Article  Google Scholar 

  9. Ning Z, Zhang K, Wang X, et al. Intelligent edge computing in Internet of vehicles: a joint computation offloading and caching solution. IEEE Trans Intell Transp Syst, 2020. doi: https://doi.org/10.1109/TITS.2020.2997832

  10. Wang X, Ning Z, Guo S, et al. Imitation learning enabled task scheduling for online vehicular edge computing. IEEE Trans Mobile Comput, 2020. doi: https://doi.org/10.1109/TMC.2020.3012509

  11. Ning Z L, Zhang K Y, Wang X J, et al. Joint computing and caching in 5G-envisioned internet of vehicles: a deep reinforcement learning-based traffic control system. IEEE Trans Intell Transp Syst, 2020. doi: https://doi.org/10.1109/TITS.2020.2970276

  12. Wang X, Ning Z, Guo S. Multi-agent imitation learning for pervasive edge computing: a decentralized computation offloading algorithm. IEEE Trans Parall Distrib Syst, 2020, 32: 411–425

    Article  Google Scholar 

  13. Zhu J, Song Y, Jiang D, et al. A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of Things. IEEE Internet Things J, 2018, 5: 2375–2385

    Article  Google Scholar 

  14. Luong N C, Hoang D T, Gong S, et al. Applications of deep reinforcement learning in communications and networking: a survey. IEEE Commun Surv Tut, 2019, 21: 3133–3174

    Article  Google Scholar 

  15. Lei L, Xu H, Xiong X, et al. Multiuser resource control with deep reinforcement learning in IoT edge computing. IEEE Internet Things J, 2019, 6: 10119–10133

    Article  Google Scholar 

  16. Chen M, Hao Y. Task offloading for mobile edge computing in software defined ultra-dense network. IEEE J Sel Areas Commun, 2018, 36: 587–597

    Article  Google Scholar 

  17. Nguyen D, Pathirana P, Ding M, et al. Privacy-preserved task offloading in mobile blockchain with deep reinforcement learning. 2019. ArXiv:1908.07467

  18. Dai Y, Xu D, Maharjan S, et al. Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Network, 2019, 33: 10–17

    Article  Google Scholar 

  19. Feng J, Yu F R, Pei Q, et al. Cooperative computation offloading and resource allocation for blockchain-enabled mobile-edge computing: a deep reinforcement learning approach. IEEE Internet Things J, 2020, 7: 6214–6228

    Article  Google Scholar 

  20. Qiu X, Liu L, Chen W, et al. Online deep reinforcement learning for computation offloading in blockchain-empowered mobile edge computing. IEEE Trans Veh Technol, 2019, 68: 8050–8062

    Article  Google Scholar 

  21. Xiong Z, Feng S, Niyato D, et al. Edge computing resource management and pricing for mobile blockchain. 2017. ArXiv:1710.01567

  22. Xiong Z, Feng S, Wang W, et al. Cloud/fog computing resource management and pricing for blockchain networks. IEEE Internet Things J, 2019, 6: 4585–4600

    Article  Google Scholar 

  23. Kang J, Xiong Z, Niyato D, et al. Toward secure blockchain-enabled internet of vehicles: optimizing consensus management using reputation and contract theory. IEEE Trans Veh Technol, 2019, 68: 2906–2920

    Article  Google Scholar 

  24. Qiu C, Hu Y, Chen Y, et al. Deep deterministic policy gradient (DDPG)-based energy harvesting wireless communications. IEEE Internet Things J, 2019, 6: 8577–8588

    Article  Google Scholar 

  25. Lillicrap T, Hunt J, Pritzel A, et al. Continuous control with deep reinforcement learning. 2015. ArXiv:1509.02971

  26. Mao C, Lin R, Xu C, et al. Towards a trust prediction framework for cloud services based on PSO-driven neural network. IEEE Access, 2017, 5: 2187–2199

    Article  Google Scholar 

  27. Asheralieva A, Niyato D. Learning-based mobile edge computing resource management to support public blockchain networks. IEEE Trans Mobile Comput, 2020. doi: https://doi.org/10.1109/TMC.2019.2959772

  28. Yu J, Kozhaya D, Decouchant J, et al. RepuCoin: your reputation is your power. IEEE Trans Comput, 2019, 68: 1225–1237

    Article  MathSciNet  Google Scholar 

  29. Liu Y, Yu F R, Li X, et al. Decentralized resource allocation for video transcoding and delivery in blockchain-based system with mobile edge computing. IEEE Trans Veh Technol, 2019, 68: 11169–11185

    Article  Google Scholar 

  30. Liu M, Yu F R, Teng Y, et al. Computation offloading and content caching in wireless blockchain networks with mobile edge computing. IEEE Trans Veh Technol, 2018, 67: 11008–11021

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by National Key R&D Program of China (Grant No. 2018YFE0206800), National Natural Science Foundation of China (Grant Nos. 61701406, 61971084, 62001073), National Natural Science Foundation of Chongqing (Grant Nos. cstc2019jcyjcxttX0002, cstc2019jcyj-msxmX0208), and Chongqing Talent Program (Grant No. CQYC2020058659).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaojie Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ning, Z., Sun, S., Wang, X. et al. Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach. Sci. China Inf. Sci. 64, 162303 (2021). https://doi.org/10.1007/s11432-020-3125-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-020-3125-y

Keywords

Navigation