Cargando…
A security mechanism based on evolutionary game in fog computing
Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5816014/ https://www.ncbi.nlm.nih.gov/pubmed/29472771 http://dx.doi.org/10.1016/j.sjbs.2017.09.010 |
_version_ | 1783300596826112000 |
---|---|
author | Sun, Yan Lin, Fuhong Zhang, Nan |
author_facet | Sun, Yan Lin, Fuhong Zhang, Nan |
author_sort | Sun, Yan |
collection | PubMed |
description | Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively. |
format | Online Article Text |
id | pubmed-5816014 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | Elsevier |
record_format | MEDLINE/PubMed |
spelling | pubmed-58160142018-02-22 A security mechanism based on evolutionary game in fog computing Sun, Yan Lin, Fuhong Zhang, Nan Saudi J Biol Sci Article Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively. Elsevier 2018-02 2017-09-29 /pmc/articles/PMC5816014/ /pubmed/29472771 http://dx.doi.org/10.1016/j.sjbs.2017.09.010 Text en © 2017 King Saud University http://creativecommons.org/licenses/by-nc-nd/4.0/ This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). |
spellingShingle | Article Sun, Yan Lin, Fuhong Zhang, Nan A security mechanism based on evolutionary game in fog computing |
title | A security mechanism based on evolutionary game in fog computing |
title_full | A security mechanism based on evolutionary game in fog computing |
title_fullStr | A security mechanism based on evolutionary game in fog computing |
title_full_unstemmed | A security mechanism based on evolutionary game in fog computing |
title_short | A security mechanism based on evolutionary game in fog computing |
title_sort | security mechanism based on evolutionary game in fog computing |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5816014/ https://www.ncbi.nlm.nih.gov/pubmed/29472771 http://dx.doi.org/10.1016/j.sjbs.2017.09.010 |
work_keys_str_mv | AT sunyan asecuritymechanismbasedonevolutionarygameinfogcomputing AT linfuhong asecuritymechanismbasedonevolutionarygameinfogcomputing AT zhangnan asecuritymechanismbasedonevolutionarygameinfogcomputing AT sunyan securitymechanismbasedonevolutionarygameinfogcomputing AT linfuhong securitymechanismbasedonevolutionarygameinfogcomputing AT zhangnan securitymechanismbasedonevolutionarygameinfogcomputing |