Enhanced IoV Security Network by Using Blockchain Governance Game
نویسندگان
چکیده
This paper deals with the design of secure network in an Enhanced Internet Vehicles by using Blockchain Governance Game (BGG). The BGG is a system model stochastic game to find best strategies towards preparation preventing malfunction attacker and applies this into connected vehicle security. Analytically tractable results for decision-making parameters enable predict moment safety operations deliver optimal combination number reserved nodes acceptance probability backup protect car. research helps whom considers enhanced IoV architecture within decentralized network.
منابع مشابه
Network Security Validation Using Game Theory
Non-functional requirements (NFR) such as network security recently gained widespread attention in distributed information systems. Despite their importance however, there is no systematic approach to validate these requirements given the complexity and uncertainty characterizing modern networks. Traditionally, network security requirements specification has been the results of a reactive proce...
متن کاملA Network Security Classification Game
We consider a network security classification game in which a strategic defender decides whether an attacker is a strategic spy or a naive spammer based on an observed sequence of attacks on fileor mail-servers. The spammer’s goal is attacking the mail-server, while the spy’s goal is attacking the file-server as much as possible before detection. The defender observes for a length of time that ...
متن کاملGame Theory Based Network Security
The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator is the follower. Multi-objective optimization...
متن کاملOptimal Game Theory for Network Security using IPDRS Engine
With the tremendous growth of network technology, network attackers are also rationally increased to disrupt the activities and hacking the data from the network users by the intruder. To provide the security from the intruder is most important one. Many researchers were proposed a different approach for providing security they does not tackle the problem, it leads an untruthful in the network....
متن کاملViolable Contracts and Governance for Blockchain Applications
We examine blockchain technologies, especially smart contracts, as a platform for decentralized applications. By providing a basis for consensus, blockchain promises to upend business models that presuppose a central authority. However, blockchain suffers from major shortcomings arising from an over-regimented way of organizing computation that limits its prospects. We propose a sociotechnical,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2021
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math9020109