Abstract
As a rising technology in recent years, edge computing has the characteristics of low latency and low energy consumption, which makes it possible for intelligent interconnection of things based on the Internet of Things(IoT) to meet people’s intelligent service needs anytime and anywhere. However, due to its wide geographical distribution, limited node resources, and vulnerability to network attacks, the operating environment of edge computing systems is in jeopardy, and user data privacy disclosure, malicious data tampering, identity authentication, and other security issues are increasingly prominent. As a distributed data-sharing technology, blockchain’s hash encryption transmission, consensus mechanism, and other characteristics determine that it has tamper-proof and traceable performance characteristics, which can well solve the security problems in edge computing systems. Although there have been quite many studies on the application of blockchain technology to the edge computing-enabled IoT system, there has been no systematic and mathematical research and analysis on the security mechanism of the blockchain technology architecture itself. From the perspective of relative security in the field of information security, this paper uses stochastic differential game theory to model the gains of both attack and defense sides under the edge computing system based on blockchain technology and obtain the Nash equilibrium solution. Runge–Kutta algorithm is used to solve the numerical solution of the revenue game model of both sides. From the perspective of architecture theory, it discusses and studies the security characteristics brought by blockchain technology architecture itself. Through simulation comparison with relevant research work and existing baseline scheme, the simulation results show the effectiveness and superiority of our proposed scheme. At the same time, the difficulty coefficient and block size are also revealed as security factors in systems based on blockchain technology.



























Similar content being viewed by others
Data availability
The data sets supporting the results of this article are included within the article and its additional files.
References
Liao Z, Pang X, Zhang J et al (2021) Blockchain on security and forensics management in edge computing for iot: a comprehensive survey[J]. IEEE Trans Netw Service Manag 19(2):1159–1175
The Mobile Economy (2020) GSMA Assoc., London, U.K., 2019. [Online]. Available: https://www.gsma.com/
Boyes H, Hallaq B, Cunningham J et al (2018) The industrial internet of things (IIoT): an analysis framework[J]. Comput Ind 101:1–12
Sengupta J, Ruj S, Bit SD (2020) A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT[J]. J Netw Comput Appl 149:102481
Ang LM, Seng KP, Ijemaru GK et al (2018) Deployment of IoV for smart cities: applications, architecture, and challenges[J]. IEEE Access 7:6473–6492
Omitaomu OA, Niu H (2021) Artificial intelligence techniques in smart grid: a survey[J]. Smart Cities 4(2):548–568
Zantalis F, Koulouras G, Karabetsos S et al (2019) A review of machine learning and IoT in smart transportation[J]. Future Internet 11(4):94
Haque AKMB, Bhushan B, Dhiman G (2022) Conceptualizing smart city applications: requirements, architecture, security issues, and emerging trends[J]. Exp Syst 39(5):e12753
Ali MS, Vecchio M, Antonelli F (2018) Enabling a blockchain-based IoT edge[J]. IEEE Internet Things Mag 1(2):24–29
Yazdinejad A, Parizi RM, Dehghantanha A et al (2020) An energy-efficient SDN controller architecture for IoT networks with blockchain-based security[J]. IEEE Trans Serv Comput 13(4):625–638
Ejaz W, Anpalagan A (2019) Blockchain technology for security and privacy in internet of things. Internet of things for smart cities. Springer, Cham, pp 47–55
Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375
Qu Q, Xu R, Chen Y et al (2021) Enable fair proof-of-work (PoW) consensus for blockchains in IoT by miner twins (MinT)[J]. Future Internet 13(11):291
Gaži P, Kiayias A, Russell A (2018) Stake-bleeding attacks on proof-of-stake blockchains. In 2018 Crypto Valley conference on Blockchain technology (CVCBT). IEEE, pp 85-92
Yang F, Zhou W, Wu QQ et al (2019) Delegated proof of stake with downgrade: a secure and efficient blockchain consensus algorithm with downgrade mechanism[J]. IEEE Access 7:118541–118555
Gartner Hype Cycle.[Online]. (2022) Available: https://www.gartner.com/
Gupta D, Wadhwa S, Moudgil A (2021) Deploying blockchain based security solutions for vehicular edge computing networks. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO). IEEE, pp 1-5
Misra S, Mukherjee A, Roy A et al (2020) Blockchain at the edge: performance of resource-constrained IoT networks[J]. IEEE Trans Parallel Distrib Syst 32(1):174–183
Wang Q, Guo Y, Wang X et al (2020) AI at the edge: blockchain-empowered secure multiparty learning with heterogeneous models[J]. IEEE Internet of Things J 7(10):9600–9610
Zhang K, Zhu Y, Maharjan S et al (2019) Edge intelligence and blockchain empowered 5G beyond for the industrial Internet of Things[J]. IEEE Network 33(5):12–19
Lin C, He D, Huang X et al (2020) BCPPA: a blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 22(12):7408–7420
Guo F, Yu FR, Zhang H et al (2019) Adaptive resource allocation in future wireless networks with blockchain and mobile edge computing[J]. IEEE Trans Wirel Commun 19(3):1689–1703
Xu D, Xiao L, Sun L et al (2017) Game theoretic study on blockchain based secure edge networks. In 2017 IEEE/CIC International Conference on Communications in China (ICCC). IEEE, pp 1-5
Wang H, Wang L, Zhou Z et al (2019) Blockchain-based resource allocation model in fog computing[J]. Appl Sci 9(24):5538
Karabacak B, Sogukpinar I (2005) ISRAM: information security risk analysis method[J]. Comput Secur 24(2):147–159
PoW 51% Attack Cost.[Online]. Available: https://www.crypto51.app/
Yeung DWK, Petrosyan LA (2006) Cooperative stochastic differential games[M]. Springer, New York
Sivasangari A, Sonti VJKK, Ajitha P et al (2022) Integrated security framework for healthcare using blockchain and fog computing. In 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC). IEEE, pp 1-5
He Y, Wang Y, Qiu C et al (2020) Blockchain-based edge computing resource allocation in IoT: a deep reinforcement learning approach[J]. IEEE Internet Things J 8(4):2226–2237
Ren J, Li J, Liu H et al (2021) Task offloading strategy with emergency handling and blockchain security in SDN-empowered and fog-assisted healthcare IoT[J]. Tsinghua Sci Technol 27(4):760–776
Guo F, Yu FR, Zhang H et al (2019) Adaptive resource allocation in future wireless networks with blockchain and mobile edge computing[J]. IEEE Trans Wirel Commun 19(3):1689–1703
Funding
There is no funding support in this article.
Author information
Authors and Affiliations
Contributions
HW wrote the main manuscript text and JA prepared figures 1–3. All authors reviewed the manuscript.
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare that they have no known competing interests or personal relationships that could have appeared to influence the work reported in this paper.
Ethical Approval
This article does not cover human or animal research.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Wang, H., An, J. Dynamic stochastic game-based security of edge computing based on blockchain. J Supercomput 79, 15894–15926 (2023). https://doi.org/10.1007/s11227-023-05289-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-023-05289-x