19 research outputs found
Reliable Distributed Computing for Metaverse: A Hierarchical Game-Theoretic Approach
The metaverse is regarded as a new wave of technological transformation that
provides a virtual space for people to interact through digital avatars. To
achieve immersive user experiences in the metaverse, real-time rendering is the
key technology. However, computing-intensive tasks of real-time rendering from
metaverse service providers cannot be processed efficiently on a single
resource-limited mobile device. Alternatively, such mobile devices can offload
the metaverse rendering tasks to other mobile devices by adopting the
collaborative computing paradigm based on Coded Distributed Computing (CDC).
Therefore, this paper introduces a hierarchical game-theoretic CDC framework
for the metaverse services, especially for the vehicular metaverse. In the
framework, idle resources from vehicles, acting as CDC workers, are aggregated
to handle intensive computation tasks in the vehicular metaverse. Specifically,
in the upper layer, a miner coalition formation game is formulated based on a
reputation metric to select reliable workers. To guarantee the reliable
management of reputation values, the reputation values calculated based on the
subjective logical model are maintained in a blockchain database. In the lower
layer, a Stackelberg game-based incentive mechanism is considered to attract
reliable workers selected in the upper layer to participate in rendering tasks.
The simulation results illustrate that the proposed framework is resistant to
malicious workers. Compared with the best-effort worker selection scheme, the
proposed scheme can improve the utility of metaverse service provider and the
average profit of CDC workers
Game Theory Based Privacy Protection for Context-Aware Services
In the era of context-aware services, users are enjoying remarkable services based on data collected from a multitude of users. To receive services, they are at risk of leaking private information from adversaries possibly eavesdropping on the data and/or the un--trusted service platform selling off its data. Malicious adversaries may use leaked information to violate users\u27 privacy in unpredictable ways. To protect users\u27 privacy, many algorithms are proposed to protect users\u27 sensitive information by adding noise, thus causing context-aware service quality loss. Game theory has been utilized as a powerful tool to balance the tradeoff between privacy protection level and service quality. However, most of the existing schemes fail to depict the mutual relationship between any two parties involved: user, platform, and adversary. There is also an oversight to formulate the interaction occurring between multiple users, as well as the interaction between any two attributes. To solve these issues, this dissertation firstly proposes a three-party game framework to formulate the mutual interaction between three parties and study the optimal privacy protection level for context-aware services, thus optimize the service quality. Next, this dissertation extends the framework to a multi-user scenario and proposes a two-layer three-party game framework. This makes the proposed framework more realistic by further exploring the interaction, not only between different parties, but also between users. Finally, we focus on analyzing the impact of long-term time-serial data and the active actions of the platform and adversary. To achieve this objective, we design a three-party Stackelberg game model to help the user to decide whether to update information and the granularity of updated information
Integration of Blockchain and Auction Models: A Survey, Some Applications, and Challenges
In recent years, blockchain has gained widespread attention as an emerging
technology for decentralization, transparency, and immutability in advancing
online activities over public networks. As an essential market process,
auctions have been well studied and applied in many business fields due to
their efficiency and contributions to fair trade. Complementary features
between blockchain and auction models trigger a great potential for research
and innovation. On the one hand, the decentralized nature of blockchain can
provide a trustworthy, secure, and cost-effective mechanism to manage the
auction process; on the other hand, auction models can be utilized to design
incentive and consensus protocols in blockchain architectures. These
opportunities have attracted enormous research and innovation activities in
both academia and industry; however, there is a lack of an in-depth review of
existing solutions and achievements. In this paper, we conduct a comprehensive
state-of-the-art survey of these two research topics. We review the existing
solutions for integrating blockchain and auction models, with some
application-oriented taxonomies generated. Additionally, we highlight some open
research challenges and future directions towards integrated blockchain-auction
models
A Comprehensive Survey On Client Selections in Federated Learning
Federated Learning (FL) is a rapidly growing field in machine learning that
allows data to be trained across multiple decentralized devices. The selection
of clients to participate in the training process is a critical factor for the
performance of the overall system. In this survey, we provide a comprehensive
overview of the state-of-the-art client selection techniques in FL, including
their strengths and limitations, as well as the challenges and open issues that
need to be addressed. We cover conventional selection techniques such as random
selection where all or partial random of clients is used for the trained. We
also cover performance-aware selections and as well as resource-aware
selections for resource-constrained networks and heterogeneous networks. We
also discuss the usage of client selection in model security enhancement.
Lastly, we discuss open issues and challenges related to clients selection in
dynamic constrained, and heterogeneous networks
Game Theory for Multi-Access Edge Computing:Survey, Use Cases, and Future Trends
Game theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming multiaccess edge computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as quality of experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game's usefulness, namely, rational versus evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game's model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse tradeoffs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios
Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0
This is the author accepted manuscript. The final version is available from IEEE via the DOI in this recordCritical infrastructure systems are vital to underpin
the functioning of a society and economy. Due to ever-increasing
number of Internet-connected Internet-of-Things (IoTs) / Industrial IoT (IIoT), and high volume of data generated and collected,
security and scalability are becoming burning concerns for
critical infrastructures in industry 4.0. The blockchain technology
is essentially a distributed and secure ledger that records all
the transactions into a hierarchically expanding chain of blocks.
Edge computing brings the cloud capabilities closer to the
computation tasks. The convergence of blockchain and edge
computing paradigms can overcome the existing security and
scalability issues. In this paper, we first introduce the IoT/IIoT
critical infrastructure in industry 4.0, and then we briefly present
the blockchain and edge computing paradigms. After that, we
show how the convergence of these two paradigms can enable
secure and scalable critical infrastructures. Then, we provide a
survey on state-of-the-art for security and privacy, and scalability
of IoT/IIoT critical infrastructures. A list of potential research
challenges and open issues in this area is also provided, which
can be used as useful resources to guide future research.Engineering and Physical Sciences Research Council (EPSRC
A Survey on Consensus Mechanisms and Mining Strategy Management in Blockchain Networks
© 2013 IEEE. The past decade has witnessed the rapid evolution in blockchain technologies, which has attracted tremendous interests from both the research communities and industries. The blockchain network was originated from the Internet financial sector as a decentralized, immutable ledger system for transactional data ordering. Nowadays, it is envisioned as a powerful backbone/framework for decentralized data processing and data-driven self-organization in flat, open-access networks. In particular, the plausible characteristics of decentralization, immutability, and self-organization are primarily owing to the unique decentralized consensus mechanisms introduced by blockchain networks. This survey is motivated by the lack of a comprehensive literature review on the development of decentralized consensus mechanisms in blockchain networks. In this paper, we provide a systematic vision of the organization of blockchain networks. By emphasizing the unique characteristics of decentralized consensus in blockchain networks, our in-depth review of the state-of-the-art consensus protocols is focused on both the perspective of distributed consensus system design and the perspective of incentive mechanism design. From a game-theoretic point of view, we also provide a thorough review of the strategy adopted for self-organization by the individual nodes in the blockchain backbone networks. Consequently, we provide a comprehensive survey of the emerging applications of blockchain networks in a broad area of telecommunication. We highlight our special interest in how the consensus mechanisms impact these applications. Finally, we discuss several open issues in the protocol design for blockchain consensus and the related potential research directions