Game theoretic study on blockchain based secure edge networks
Title | Game theoretic study on blockchain based secure edge networks |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Xu, D., Xiao, L., Sun, L., Lei, M. |
Conference Name | 2017 IEEE/CIC International Conference on Communications in China (ICCC) |
Date Published | Oct. 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5386-4502-4 |
Keywords | attack motivation, blockchain, blockchain security, blockchain security game, blockchain-based secure edge networks, cloud computing, data privacy, edge network, edge server, game theoretic security, game theoretic study, game theory, Games, human factors, illegal security gains, Metrics, mobile device, Mobile handsets, Nash equilibria, NE, Network security, performance evaluation, Predictive Metrics, pubcrawl, punishment scheme, resilience, Resiliency, Scalability, security, Servers |
Abstract | Blockchain has been applied to study data privacy and network security recently. In this paper, we propose a punishment scheme based on the action record on the blockchain to suppress the attack motivation of the edge servers and the mobile devices in the edge network. The interactions between a mobile device and an edge server are formulated as a blockchain security game, in which the mobile device sends a request to the server to obtain real-time service or launches attacks against the server for illegal security gains, and the server chooses to perform the request from the device or attack it. The Nash equilibria (NEs) of the game are derived and the conditions that each NE exists are provided to disclose how the punishment scheme impacts the adversary behaviors of the mobile device and the edge server. |
URL | https://ieeexplore.ieee.org/document/8330529/ |
DOI | 10.1109/ICCChina.2017.8330529 |
Citation Key | xu_game_2017 |
- Metrics
- Servers
- security
- Scalability
- Resiliency
- resilience
- punishment scheme
- pubcrawl
- Predictive Metrics
- performance evaluation
- network security
- NE
- Nash equilibria
- Mobile handsets
- mobile device
- attack motivation
- illegal security gains
- Human Factors
- Games
- game theory
- game theoretic study
- game theoretic security
- edge server
- edge network
- data privacy
- Cloud Computing
- blockchain-based secure edge networks
- blockchain security game
- blockchain security
- blockchain