期刊文献+

A Non-Cooperative Differential Game-Based Security Model in Fog Computing 被引量:4

A Non-Cooperative Differential Game-Based Security Model in Fog Computing
下载PDF
导出
摘要 Fog computing is a new paradigm providing network services such as computing, storage between the end users and cloud. The distributed and open structure are the characteristics of fog computing, which make it vulnerable and very weak to security threats. In this article, the interaction between vulnerable nodes and malicious nodes in the fog computing is investigated as a non-cooperative differential game. The complex decision making process is reviewed and analyzed. To solve the game, a fictitious play-based algorithm is which the vulnerable node and the malicious nodes reach a feedback Nash equilibrium. We attain optimal strategy of energy consumption with Qo S guarantee for the system, which are conveniently operated and suitable for fog nodes. The system simulation identifies the propagation of malicious nodes. We also determine the effects of various parameters on the optimal strategy. The simulation results support a theoretical foundation to limit malicious nodes in fog computing, which can help fog service providers make the optimal dynamic strategies when different types of nodes dynamically change their strategies. Fog computing is a new paradigm providing network services such as computing, storage between the end users and cloud. The distributed and open structure are the characteristics of fog computing, which make it vulnerable and very weak to security threats. In this article, the interaction between vulnerable nodes and malicious nodes in the fog computing is investigated as a non-cooperative differential game. The complex decision making process is reviewed and analyzed. To solve the game, a fictitious play-based algorithm is which the vulnerable node and the malicious nodes reach a feedback Nash equilibrium. We attain optimal strategy of energy consumption with Qo S guarantee for the system, which are conveniently operated and suitable for fog nodes. The system simulation identifies the propagation of malicious nodes. We also determine the effects of various parameters on the optimal strategy. The simulation results support a theoretical foundation to limit malicious nodes in fog computing, which can help fog service providers make the optimal dynamic strategies when different types of nodes dynamically change their strategies.
出处 《China Communications》 SCIE CSCD 2017年第1期180-189,共10页 中国通信(英文版)
基金 supported by the National Science Foundation Project of P. R. China (No. 61501026,61572072) Fundamental Research Funds for the Central Universities (No. FRF-TP-15-032A1)
关键词 fog computing differential game fog security feedback nash equilibrium fog computing differential game fog security feedback nash equilibrium
  • 相关文献

参考文献2

二级参考文献57

  • 1ITU-T Y.2060. Overview of the Internet of Things[S], 2012.
  • 2GIUSTO D, [ERA A, MORABITO G, et al The Internet of Things[M]. Springer: Signals and Communication, 2010.
  • 3National Intelligence Council, Disruptive Civil Technalogies-Six Technalogies with Potential Impacts on US Interests Out to 2025--Con- ference Report CR, CR 2008-07[R]. 2008.
  • 4SERBULENT T, MURAT S, WEI MAC), et al Wi-Fi Enabled Sensors for Internet of Things: A Practical Approach[J]. IEEE Communications Magazine, 2012, 50(6): 134-143.
  • 5S/kNCHEZ LOPEZ T, RANASINGHE D C, HARR- ISON M, et al Adding Sense to the Internet of Things[J]. Personal and Ubiquitous Comput- ing, 2012, 16(3): 291-308.
  • 6ROMAN R, ALCARAZ C, LOPEZ J, et al Key Man- agement Systems for Sensor Networks in the Context of the Internet of Things[J]. Compu- ters and Electrical Engineering, 2011, 37(2): 147-159.
  • 7KLAUCK R, KIRSCHE M. A Case Study of a DNS-Based Discovery Service for the Internet of Things[J]. ADHOC-NOW, 2012: 316-329.
  • 8CHEN Zhikui, XIA Feng, HUANG Tao, et al A Localization Method for the Internet of Things [J]. Journal of Supercomputing, 2011: 1-18.
  • 9WU T Y, LIAW G H, HUANG S W, et al A GA- Based Mobile RFID Localization Scheme for Internet of Things[J]. Personal and Ubiquitous Computing, 2012 16(3): 245-258.
  • 10CHEN Zhikui, WANG Haozhe, LIU Yang, et al. A Context-Aware Routing Protocal on Internet of Things Based on Sea Computing Model[J]. Journal of Computers, 2012, 7(1): 96-105.

共引文献12

同被引文献10

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部