A security mechanism based on evolutionary game in fog computing

被引:14
|
作者
Sun, Yan [1 ]
Lin, Fuhong [1 ]
Zhang, Nan [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
关键词
Fog computing; Human nervous system; Security mechanism; Evolutionary game;
D O I
10.1016/j.sjbs.2017.09.010
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively. (C) 2017 The Authors. Production and hosting by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license.
引用
收藏
页码:237 / 241
页数:5
相关论文
共 50 条
  • [1] A Non-Cooperative Differential Game-Based Security Model in Fog Computing
    Li, Zhi
    Zhou, Xianwei
    Liu, Yanzhu
    Xu, Haitao
    Miao, Li
    [J]. CHINA COMMUNICATIONS, 2017, 14 (01) : 180 - 189
  • [2] A Non-Cooperative Differential Game-Based Security Model in Fog Computing
    Zhi Li
    Xianwei Zhou
    Yanzhu Liu
    Haitao Xu
    Li Miao
    [J]. China Communications, 2017, 14 (01) : 180 - 189
  • [3] A new Security Mechanism for Vehicular Cloud Computing Using Fog Computing System
    Bousselham, Mhidi
    Benamar, Nabil
    Addaim, Adnane
    [J]. 2019 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2019,
  • [4] An evolutionary game approach to IoT task offloading in fog-cloud computing
    Hamidreza Mahini
    Amir Masoud Rahmani
    Seyyedeh Mobarakeh Mousavirad
    [J]. The Journal of Supercomputing, 2021, 77 : 5398 - 5425
  • [5] An evolutionary game approach to IoT task offloading in fog-cloud computing
    Mahini, Hamidreza
    Rahmani, Amir Masoud
    Mousavirad, Seyyedeh Mobarakeh
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (06): : 5398 - 5425
  • [6] Fog computing network security based on resources management
    Daoud, Wided Ben
    Othmen, Salwa
    Hamdi, Monia
    Khdhir, Radhia
    Hamam, Habib
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [7] Fog computing network security based on resources management
    Wided Ben Daoud
    Salwa Othmen
    Monia Hamdi
    Radhia Khdhir
    Habib Hamam
    [J]. EURASIP Journal on Wireless Communications and Networking, 2023
  • [8] Linguistic-Based Security in Fog and Cloud Computing
    Ogiela, Urszula
    Takizawa, Makoto
    Ogiela, Lidia
    [J]. ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES, 2019, 29 : 120 - 127
  • [9] Security Issues With Fog Computing
    Miatra, Ayati
    Kumar, Sumit
    [J]. PROCEEDINGS OF THE CONFLUENCE 2020: 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING, 2020, : 123 - 128
  • [10] Fog computing security: A review
    Jumani, Awais Khan
    Shi, Jinglun
    Laghari, Asif Ali
    Hu, Zhihui
    ul Nabi, Aftab
    Qian, Huang
    [J]. SECURITY AND PRIVACY, 2023, 6 (06)