Security resource allocation in blockchain-based IoT

被引:0
|
作者
Zhang, Hang [1 ,2 ,3 ]
Wang, Jinsong [1 ,2 ,3 ]
Zhao, Zening [1 ,2 ,3 ]
Sun, Huayue [1 ]
机构
[1] Tianjin Univ Technol, Sch Comp Sci & Engn, Tianjin 300384, Peoples R China
[2] Tianjin Key Lab Intelligence Comp & Novel Software, Tianjin 300384, Peoples R China
[3] Natl Engn Lab Comp Virus Prevent & Control Technol, Tianjin 300457, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of things; Edge computing; Blockchain; Resource allocation; 51% double-spend attack; Evolutionary game; MOBILE BLOCKCHAIN; GAME;
D O I
10.1007/s12083-024-01852-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing helps alleviate the problem of limited computational resources in user devices (UDs), promoting the integration of blockchain and the Internet of Things (IoT). However, improper allocation of computational resources can increase the risk of a 51% double-spend attack. Therefore, this paper explores the issue of resource allocation in blockchain-based IoT. Specifically, we consider practical factors such as propagation delay and mining rewards, and formalize the competition for computing resources among UDs as an evolutionary game, analyzing the evolutionary stability strategy (ESS). We predict the probability of a successful 51% double-spend attack and provide conditions for identifying high-risk and low-risk scenarios to alert 51% double-spend attack risks. Experimental simulation results validate the evolutionary stability of resource competition among UD groups and show the impact of various parameters on resource allocation and the probability of successful 51% double-spend attacks. Finally, recommendations and strategies for mitigating 51% double-spend attack risks are provided from three perspectives.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [31] Incentive Mechanism Design for Joint Resource Allocation in Blockchain-Based Federated Learning
    Wang, Zhilin
    Hu, Qin
    Li, Ruinian
    Xu, Minghui
    Xiong, Zehui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 34 (05) : 1536 - 1547
  • [32] Efficient QoS Support for Robust Resource Allocation in Blockchain-Based Femtocell Networks
    Liu, Zhixin
    Gao, Lu
    Liu, Yang
    Guan, Xinping
    Ma, Kai
    Wang, Yu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7070 - 7080
  • [33] A New Blockchain-Based Auction Method for Resource Allocation in Fog Computing Environment
    Ghasemi, Arezoo
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2025, 33 (01)
  • [34] An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security
    Yazdinejad, Abbas
    Parizi, Reza M.
    Dehghantanha, Ali
    Zhang, Qi
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (04) : 625 - 638
  • [35] Blockchain-based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design
    Banerjee, Mandrita
    Lee, Junghee
    Chen, Qian
    Choo, Kim-Kwang Raymond
    2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
  • [36] A blockchain-based clock synchronization Scheme in IoT
    Fan, Kai
    Sun, Shili
    Yan, Zheng
    Pan, Qiang
    Li, Hui
    Yang, Yintang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 524 - 533
  • [37] Scalability analysis of a blockchain-based security strategy for complex IoT systems
    Miquel Martinez, Marti
    Marin-Tordera, Eva
    Masip-Bruin, Xavi
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [38] Security Protocol for Internet of Things (IoT): Blockchain-based Implementation and Analysis
    Gagneja, Kanwalinderjit
    Kiefer, Riley
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
  • [39] Survey on Blockchain-Based IoT Payment and Marketplaces
    Saputhanthri, Amila
    De Alwis, Chamitha
    Liyanage, Madhusanka
    IEEE ACCESS, 2022, 10 : 103411 - 103437
  • [40] A Novel Blockchain-based Anonymous Mutual Authentication Method for IoT Security
    Hu, Dan
    Xiong, Xuanrui
    Zhang, Hanchi
    Zhang, Junlin
    Zheng, Jianbo
    Xiao, Lei
    2024 IEEE INTERNATIONAL CONFERENCE ON SMART INTERNET OF THINGS, SMARTIOT 2024, 2024, : 123 - 128