Font Size: a A A

Research On The Edge Computing Security Resource Allocation Algorithm Based On Mobile Blockchain

Posted on:2023-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:T TangFull Text:PDF
GTID:2568307043986299Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Blockchain technology is predicted to be one of the key technologies of 6G cellular mobile communication due to its advantages of decentralization,anonymity,openness,and immutability.Blockchain technology based on mobile communication can protect privacy and save costs.However,due to problems such as fixed scenarios and energy consumption in traditional blockchains,the mobile blockchain generated by mobile mining may become a mainstream technology and be applied in various aspects in the future.In mobile communication,mobile devices cannot meet the huge computing power requirements of mobile blockchain due to power supply and memory problems.Mobile users can offload mining tasks to edge computing servers.Mobile blockchain in the communication environment needs to reconstruct the system security model and apply it to the cooperative processing of offloading tasks.This dissertation first puts forward assumptions about mobile blockchain based on traditional blockchain and mobile edge computing,analyzes the attack model of traditional blockchain,forms a computing power alliance,and builds a security model based on smart contracts.The security guarantee of mobile blockchain is formed from three aspects: the increase of the difficulty threshold of personal computing power,the improvement of security based on contract accounts,and the reduction of the success probability of fork attacks.The auction algorithm is used in the process of resource allocation to construct a price-utility function in solving the problem of maximizing social welfare.The simulation results verify that the security increases with the increase of the sealed funds and the sealed duration,and the success rate of the fork attack decreases with the increase of the number of validators.Compared with traditional methods,the joint optimization algorithm has certain advantages in the sum of utility and average return,and its security is also higher than that of other algorithms.After ensuring the security of mobile blockchain,in the offloading task processing of mobile edge computing,mobile blockchain is used as an application,and according to its decentralization and openness,surrounding idle devices are called for collaborative offloading to form the computing task is divided into small tasks for processing.Build a network offload model and analyze the utilization function of available offload resources.Aiming at the delay,the overall upload distributed offloading strategy and decentralized uploading without offloading strategy are proposed.The energy consumption analysis is carried out with the optimal strategy based on the delay and energy consumption,the utility function of the delay and energy consumption is constructed,and the edge server is constrained by the accident rate and the offloading cost.The utility function is optimized using the convex ε-greedy algorithm.The simulation results verify that the algorithm obtains a higher equilibrium point for the utility function and improves the utilization of available offloading resources in the region.
Keywords/Search Tags:Mobile edge computing, Mobile blockchain, Resource allocation, Safety, Resource utilization
PDF Full Text Request
Related items