Security resource allocation in blockchain-based IoT

被引:0
|
作者
Hang Zhang [1 ]
Jinsong Wang [2 ]
Zening Zhao [3 ]
Huayue Sun [1 ]
机构
[1] Tianjin University of Technology,School of Computer Science and Engineering
[2] Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology,undefined
[3] National Engineering Laboratory for Computer Virus Prevention and Control Technology,undefined
关键词
Internet of things; Edge computing; Blockchain; Resource allocation; 51% double-spend attack; Evolutionary game;
D O I
10.1007/s12083-024-01852-2
中图分类号
学科分类号
摘要
Edge computing helps alleviate the problem of limited computational resources in user devices (UDs), promoting the integration of blockchain and the Internet of Things (IoT). However, improper allocation of computational resources can increase the risk of a 51% double-spend attack. Therefore, this paper explores the issue of resource allocation in blockchain-based IoT. Specifically, we consider practical factors such as propagation delay and mining rewards, and formalize the competition for computing resources among UDs as an evolutionary game, analyzing the evolutionary stability strategy (ESS). We predict the probability of a successful 51% double-spend attack and provide conditions for identifying high-risk and low-risk scenarios to alert 51% double-spend attack risks. Experimental simulation results validate the evolutionary stability of resource competition among UD groups and show the impact of various parameters on resource allocation and the probability of successful 51% double-spend attacks. Finally, recommendations and strategies for mitigating 51% double-spend attack risks are provided from three perspectives.
引用
收藏
相关论文
共 50 条
  • [21] Scalability analysis of a blockchain-based security strategy for complex IoT systems
    Miquel Martinez, Marti
    Marin-Tordera, Eva
    Masip-Bruin, Xavi
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [22] Enhancing IoT Security: A Blockchain-Based Mitigation Framework for Deauthentication Attacks
    Gopalan, S. Harihara
    Manikandan, A.
    Dharani, N. P.
    Sujatha, G.
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2024, : 237 - 249
  • [23] Blockchain-Based Community Safety Security System with IoT Secure Devices
    Chen, Chin-Ling
    Lim, Zi-Yi
    Liao, Hsien-Chou
    SUSTAINABILITY, 2021, 13 (24)
  • [24] Security Protocol for Internet of Things (IoT): Blockchain-based Implementation and Analysis
    Gagneja, Kanwalinderjit
    Kiefer, Riley
    2020 SIXTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV)), 2020,
  • [25] Deep Reinforcement Learning for Resource Allocation in Blockchain-based Federated Learning
    Dai, Yueyue
    Yang, Huijiong
    Yang, Huiran
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 179 - 184
  • [26] Adaptive Resource Allocation for Blockchain-Based Federated Learning in Internet of Things
    Zhang, Jiaxiang
    Liu, Yiming
    Qin, Xiaoqi
    Xu, Xiaodong
    Zhang, Ping
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 10621 - 10635
  • [27] Blockchain-Based Resource Syndicate
    Hwang, Seong Oun
    Mehmood, Asif
    COMPUTER, 2019, 52 (05) : 58 - 66
  • [28] Blockchain-based multimedia security
    Zhang, Yushu
    Li, Ming
    Guo, Shangwei
    Meng, Weizhi
    Li, Hongxiang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (20) : 30581 - 30581
  • [29] Blockchain-based multimedia security
    Multimedia Tools and Applications, 2021, 80 : 30581 - 30581
  • [30] Enabling a blockchain-basEd ioT EdgE
    Ali, Muhammad Salek
    Vecchio, Massimo
    Antonelli, Fabio
    IEEE Internet of Things Magazine, 2018, 1 (02): : 24 - 29