Abstract
Internet of things (IoT) technology is in continuous development, and the access of the IoT power terminal is facing various security threats such as data tampering and malicious attacks. Thus, we propose a blockchain-based edge-terminal collaborative resource allocation architecture to solve these security problems, which places the terminal trusted authentication data on the blockchain to realize the security of the terminal authentication information. Since the mining process of the blockchain system will generate a large number of computing intensive tasks, this paper establishes an energy-oriented blockchain mining task offloading model, and proposes the energy-aware blockchain resource allocation (EABRA) algorithm with deep reinforcement learning (DRL) to jointly optimize the offloading decision and transmission power allocation decision. Finally, the simulation results show that the EABRA algorithm can save 68.87% energy consumption than the Random algorithm, which verifies the correctness and feasibility of the scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)
Rashid, M.A., Pajooh, H.H.: A security framework for iot authentication and authorization based on blockchain technology. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), Rotorua, New Zealand, pp. 264–271 (2019)
Guo, S., Hu, X., Guo, S., Qiu, X., Qi, F.: Blockchain meets edge computing: a distributed and trusted authentication system. IEEE Trans. Ind. Inform. 16(3), 1972–1983 (2020)
Neisse, R., Hernández-Ramos, J.L., Matheu, S.N., Baldini, G., Skarmeta, A.: Toward a blockchain-based platform to manage cybersecurity certification of IoT devices. In: 2019 IEEE Conference on Standards for Communications and Networking (CSCN), Granada, Spain, pp. 1–6 (2019)
Cui, Z., et al.: A hybrid blockchain-based identity authentication scheme for Multi-WSN. IEEE Trans. Serv. Comput. 13(2), 241–251 (2020)
Thakker, J., Chang, I., Park, Y.: Secure data management in internet-of-things based on blockchain. In: 2020 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, pp. 1–5 (2020)
Liu, M., Yu, F.R., Teng, Y., Leung, V.C.M., Song, M.: Computation offloading and content caching in wireless blockchain networks with mobile edge computing. IEEE Trans. Veh. Technol. 67(11), 11008–11021 (2018)
Feng, J., Yu, F.R., Pei, Q., Chu, X., Du, J., Zhu, L.: Cooperative computation offloading and resource allocation for blockchain-enabled mobile-edge computing: a deep reinforcement learning approach. IEEE Internet Things J. 7(7), 6214–6228 (2020)
Mnih, V., et al.: Asynchronous methods for deep reinforcement learning. In: International Conference on Machine Learning, pp. 1928–1937 (2016)
Acknowledgment
This work is supported by the Science and Technology Project of State Grid Corporation of China: Research on Key Technologies of dynamic identity security authentication and risk control in power business (SGHEXT00YJJS1900050).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Gao, L., Zhang, X., Liu, T., Yang, H., Liao, B., Guo, J. (2021). Energy-Aware Blockchain Resource Allocation Algorithm with Deep Reinforcement Learning for Trusted Authentication. In: Cheng, M., Yu, P., Hong, Y., Jia, H. (eds) Smart Grid and Innovative Frontiers in Telecommunications. SmartGIFT 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 373. Springer, Cham. https://doi.org/10.1007/978-3-030-73562-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-73562-3_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73561-6
Online ISBN: 978-3-030-73562-3
eBook Packages: Computer ScienceComputer Science (R0)