Security resource allocation in blockchain-based IoT

被引:0
|
作者
Zhang, Hang [1 ,2 ,3 ]
Wang, Jinsong [1 ,2 ,3 ]
Zhao, Zening [1 ,2 ,3 ]
Sun, Huayue [1 ]
机构
[1] Tianjin Univ Technol, Sch Comp Sci & Engn, Tianjin 300384, Peoples R China
[2] Tianjin Key Lab Intelligence Comp & Novel Software, Tianjin 300384, Peoples R China
[3] Natl Engn Lab Comp Virus Prevent & Control Technol, Tianjin 300457, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of things; Edge computing; Blockchain; Resource allocation; 51% double-spend attack; Evolutionary game; MOBILE BLOCKCHAIN; GAME;
D O I
10.1007/s12083-024-01852-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing helps alleviate the problem of limited computational resources in user devices (UDs), promoting the integration of blockchain and the Internet of Things (IoT). However, improper allocation of computational resources can increase the risk of a 51% double-spend attack. Therefore, this paper explores the issue of resource allocation in blockchain-based IoT. Specifically, we consider practical factors such as propagation delay and mining rewards, and formalize the competition for computing resources among UDs as an evolutionary game, analyzing the evolutionary stability strategy (ESS). We predict the probability of a successful 51% double-spend attack and provide conditions for identifying high-risk and low-risk scenarios to alert 51% double-spend attack risks. Experimental simulation results validate the evolutionary stability of resource competition among UD groups and show the impact of various parameters on resource allocation and the probability of successful 51% double-spend attacks. Finally, recommendations and strategies for mitigating 51% double-spend attack risks are provided from three perspectives.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [1] A Blockchain-based Authentication and Security Mechanism for IoT
    Li, Dongxing
    Peng, Wei
    Deng, Wenping
    Gai, Fangyu
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [2] A Blockchain-Based Security Model for IoT Systems
    Chen, Bing
    Liu, Ding
    Zhang, Ting
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2022, 21 (02)
  • [3] Blockchain-Based Resource Allocation Mechanism for the Internet of Vehicles: Balancing Efficiency and Security
    Hu, Zhuo
    Liu, Bozhi
    Shen, Ao
    Luo, Jie
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 3971 - 3987
  • [4] Blockchain-Based Edge Computing Resource Allocation in IoT: A Deep Reinforcement Learning Approach
    He, Ying
    Wang, Yuhang
    Qiu, Chao
    Lin, Qiuzhen
    Li, Jianqiang
    Ming, Zhong
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2226 - 2237
  • [5] Blockchain-Based Data Security and Sharing for Resource-Constrained Devices in Manufacturing IoT
    Tan, Jinbiao
    Shi, Jianhua
    Wan, Jiafu
    Dai, Hong-Ning
    Jin, Jiong
    Zhang, Rui
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (15): : 25558 - 25567
  • [6] A review study on blockchain-based IoT security and forensics
    Kamal, Randa
    Hemdan, Ezz El-Din
    El-Fishway, Nawal
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (30) : 36183 - 36214
  • [7] Blockchain-Based Security Deployment and Resource Allocation in SDN-Enabled MEC System
    Zhao, Dongxiao
    Zhang, Dawei
    Pei, Qingqi
    Liu, Lei
    Yue, Peixin
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (24): : 40417 - 40430
  • [8] A Blockchain-based IoT Security Solution Using Multichain
    Ismail, Shereen
    Reza, Hassan
    Zadeh, Hossein Kashani
    Vasefi, Fartash
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 1105 - 1111
  • [9] A review study on blockchain-based IoT security and forensics
    Randa Kamal
    Ezz El-Din Hemdan
    Nawal El-Fishway
    Multimedia Tools and Applications, 2021, 80 : 36183 - 36214
  • [10] Towards Blockchain-Based Resource Allocation Models for Cloud-Edge Computing in IoT Applications
    Liu, Xing
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 135 (04) : 2483 - 2483