Cargando…

A security mechanism based on evolutionary game in fog computing

Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present...

Descripción completa

Detalles Bibliográficos
Autores principales: Sun, Yan, Lin, Fuhong, Zhang, Nan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5816014/
https://www.ncbi.nlm.nih.gov/pubmed/29472771
http://dx.doi.org/10.1016/j.sjbs.2017.09.010
_version_ 1783300596826112000
author Sun, Yan
Lin, Fuhong
Zhang, Nan
author_facet Sun, Yan
Lin, Fuhong
Zhang, Nan
author_sort Sun, Yan
collection PubMed
description Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.
format Online
Article
Text
id pubmed-5816014
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-58160142018-02-22 A security mechanism based on evolutionary game in fog computing Sun, Yan Lin, Fuhong Zhang, Nan Saudi J Biol Sci Article Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively. Elsevier 2018-02 2017-09-29 /pmc/articles/PMC5816014/ /pubmed/29472771 http://dx.doi.org/10.1016/j.sjbs.2017.09.010 Text en © 2017 King Saud University http://creativecommons.org/licenses/by-nc-nd/4.0/ This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
spellingShingle Article
Sun, Yan
Lin, Fuhong
Zhang, Nan
A security mechanism based on evolutionary game in fog computing
title A security mechanism based on evolutionary game in fog computing
title_full A security mechanism based on evolutionary game in fog computing
title_fullStr A security mechanism based on evolutionary game in fog computing
title_full_unstemmed A security mechanism based on evolutionary game in fog computing
title_short A security mechanism based on evolutionary game in fog computing
title_sort security mechanism based on evolutionary game in fog computing
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5816014/
https://www.ncbi.nlm.nih.gov/pubmed/29472771
http://dx.doi.org/10.1016/j.sjbs.2017.09.010
work_keys_str_mv AT sunyan asecuritymechanismbasedonevolutionarygameinfogcomputing
AT linfuhong asecuritymechanismbasedonevolutionarygameinfogcomputing
AT zhangnan asecuritymechanismbasedonevolutionarygameinfogcomputing
AT sunyan securitymechanismbasedonevolutionarygameinfogcomputing
AT linfuhong securitymechanismbasedonevolutionarygameinfogcomputing
AT zhangnan securitymechanismbasedonevolutionarygameinfogcomputing