A Non-Cooperative Differential Game-Based Security Model in Fog Computing  被引量:4

A Non-Cooperative Differential Game-Based Security Model in Fog Computing

在线阅读下载全文

作  者:Zhi Li Xianwei Zhou Yanzhu Liu Haitao Xu Li Miao 

机构地区:[1]School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing, 100083, China [2]Great Wall Computer Software and Systems Inc., Beijing, 100190, China

出  处:《China Communications》2017年第1期180-189,共10页中国通信(英文版)

基  金:supported by the National Science Foundation Project of P. R. China (No. 61501026,61572072);Fundamental Research Funds for the Central Universities (No. FRF-TP-15-032A1)

摘  要:Fog computing is a new paradigm providing network services such as computing, storage between the end users and cloud. The distributed and open structure are the characteristics of fog computing, which make it vulnerable and very weak to security threats. In this article, the interaction between vulnerable nodes and malicious nodes in the fog computing is investigated as a non-cooperative differential game. The complex decision making process is reviewed and analyzed. To solve the game, a fictitious play-based algorithm is which the vulnerable node and the malicious nodes reach a feedback Nash equilibrium. We attain optimal strategy of energy consumption with Qo S guarantee for the system, which are conveniently operated and suitable for fog nodes. The system simulation identifies the propagation of malicious nodes. We also determine the effects of various parameters on the optimal strategy. The simulation results support a theoretical foundation to limit malicious nodes in fog computing, which can help fog service providers make the optimal dynamic strategies when different types of nodes dynamically change their strategies.Fog computing is a new paradigm providing network services such as computing, storage between the end users and cloud. The distributed and open structure are the characteristics of fog computing, which make it vulnerable and very weak to security threats. In this article, the interaction between vulnerable nodes and malicious nodes in the fog computing is investigated as a non-cooperative differential game. The complex decision making process is reviewed and analyzed. To solve the game, a fictitious play-based algorithm is which the vulnerable node and the malicious nodes reach a feedback Nash equilibrium. We attain optimal strategy of energy consumption with Qo S guarantee for the system, which are conveniently operated and suitable for fog nodes. The system simulation identifies the propagation of malicious nodes. We also determine the effects of various parameters on the optimal strategy. The simulation results support a theoretical foundation to limit malicious nodes in fog computing, which can help fog service providers make the optimal dynamic strategies when different types of nodes dynamically change their strategies.

关 键 词:fog computing differential game fog security feedback nash equilibrium 

分 类 号:TP393.09[自动化与计算机技术—计算机应用技术] TP309[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象