Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions-based Internet of Things Mobile Edge Computing
C. T. Kalaivani, R. Renugadevi, Jeffin Gracewell, A. Arul Edwin Raj
{"title":"Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions-based Internet of Things Mobile Edge Computing","authors":"C. T. Kalaivani, R. Renugadevi, Jeffin Gracewell, A. Arul Edwin Raj","doi":"10.1002/ett.4981","DOIUrl":null,"url":null,"abstract":"<p>VNFs boost data processing efficiency in Mobile Edge Computing (MEC)-driven Internet of Things (IoT) for healthcare, smart cities, and industrial automation. VNF-based IoT MEC systems encounter a significant security threat due to unauthorized access, posing risks to data privacy and system integrity. Existing approaches struggle to adapt to dynamic environments and lack tamper-proof enforcement mechanisms. In this work, we propose a novel system combining Reinforcement Learning (RL) and blockchain technology to revoke unauthorized access in VNF-based IoT MEC. We introduce the Integrated Action-selection DRL Algorithm for Unauthorized Access Revocation (IASDRL-UAR), a novel RL approach that excels in dynamic environments by handling both continuous and discrete actions, enabling real-time optimization of security risk, execution time, and energy consumption. A behavior control contract (BCC) is proposed and integrated into the RL system, automating behavior checks and enforcement, streamlining security management, and reducing manual intervention. RL feedback plays a pivotal role in steering dynamic security adjustments, gaining valuable perspectives from user behavior via trust scores in the behavior contract. The security features of the proposed method are analyzed. Performance comparisons reveal a substantial improvement, with the proposed system outperforming existing methods by 30% in terms of throughput, 21.7% in system stability, and 26% in access revocation latency. Additionally, the system demonstrates a higher security index, energy efficiency, and scalability.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transactions on Emerging Telecommunications Technologies","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/ett.4981","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
VNFs boost data processing efficiency in Mobile Edge Computing (MEC)-driven Internet of Things (IoT) for healthcare, smart cities, and industrial automation. VNF-based IoT MEC systems encounter a significant security threat due to unauthorized access, posing risks to data privacy and system integrity. Existing approaches struggle to adapt to dynamic environments and lack tamper-proof enforcement mechanisms. In this work, we propose a novel system combining Reinforcement Learning (RL) and blockchain technology to revoke unauthorized access in VNF-based IoT MEC. We introduce the Integrated Action-selection DRL Algorithm for Unauthorized Access Revocation (IASDRL-UAR), a novel RL approach that excels in dynamic environments by handling both continuous and discrete actions, enabling real-time optimization of security risk, execution time, and energy consumption. A behavior control contract (BCC) is proposed and integrated into the RL system, automating behavior checks and enforcement, streamlining security management, and reducing manual intervention. RL feedback plays a pivotal role in steering dynamic security adjustments, gaining valuable perspectives from user behavior via trust scores in the behavior contract. The security features of the proposed method are analyzed. Performance comparisons reveal a substantial improvement, with the proposed system outperforming existing methods by 30% in terms of throughput, 21.7% in system stability, and 26% in access revocation latency. Additionally, the system demonstrates a higher security index, energy efficiency, and scalability.
期刊介绍:
ransactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:
- to attract cutting-edge publications from leading researchers and research groups around the world
- to become a highly cited source of timely research findings in emerging fields of telecommunications
- to limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish
- to become the leading journal for publishing the latest developments in telecommunications