首页 > 最新文献

IEEE Transactions on Network Science and Engineering最新文献

英文 中文
Spatio-Temporal Coordinated Operation Strategy of Data Centers Considering Virtual Storage System via Two-Stage Distributionally Robust Optimization 基于两阶段分布鲁棒优化的虚拟存储数据中心时空协同运行策略
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-17 DOI: 10.1109/TNSE.2026.3665604
Xuexue Qin;Zening Li;Zhengmao Li;Yixun Xue;Xinyue Chang;Jia Su;Xiaolong Jin;Peng Wang;Hongbin Sun
Energy consumption in data centers is growing rapidly in recent years. To realize the economic and flexible operation of data centers, this paper proposes a spatio-temporal coordinated operation strategy of data centers considering virtual storage system (VSS) via two-stage distributionally robust optimization. First, based on the dynamic thermal network of buildings and differentiated demands of cloud users in data centers, a comprehensive operation model with VSS is proposed. Then, considering uncertainties of general load demands from data centers and outdoor temperatures, a fuzzy set is deduced, using an imprecise Dirichlet model derived from historical data. This ensures confidence level satisfaction for uncertain sets of general load and outdoor temperatures. In addition, the spatio-temporal coordinated operation strategy of data centers considering virtual storage system via two-stage distributionally robust optimization that flexibly adjusts conservativeness through uncertainty regulation parameters. Finally, a Dynamic Accuracy Column and Constraint Generation (DA-C&CG) algorithm is developed for solving the proposed strategy. The results indicate that the proposed strategy can effectively enhance operational economics, computing efficiency and resilience by leveraging flexibility in cooling and cloud user loads within suitable server temperatures. Meanwhile, the DA-C&CG algorithm exhibits excellent solution performance.
近年来,数据中心的能耗增长迅速。为实现数据中心的经济灵活运行,通过两阶段分布鲁棒优化,提出了一种考虑虚拟存储系统(VSS)的数据中心时空协同运行策略。首先,基于建筑动态热网络和数据中心云用户的差异化需求,提出了一种基于VSS的综合运营模型。然后,考虑数据中心一般负荷需求和室外温度的不确定性,利用历史数据导出的不精确狄利克雷模型推导出模糊集。这确保了一般负载和室外温度的不确定设置的置信度满意。此外,通过两阶段分布鲁棒优化,通过不确定性调节参数灵活调整保守性,提出了考虑虚拟存储系统的数据中心时空协同运行策略。最后,提出了一种动态精度列和约束生成(DA-C&CG)算法来求解该策略。结果表明,该策略通过在适当的服务器温度下利用冷却和云用户负载的灵活性,可以有效地提高运营经济性、计算效率和弹性。同时,DA-C&CG算法表现出优异的求解性能。
{"title":"Spatio-Temporal Coordinated Operation Strategy of Data Centers Considering Virtual Storage System via Two-Stage Distributionally Robust Optimization","authors":"Xuexue Qin;Zening Li;Zhengmao Li;Yixun Xue;Xinyue Chang;Jia Su;Xiaolong Jin;Peng Wang;Hongbin Sun","doi":"10.1109/TNSE.2026.3665604","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3665604","url":null,"abstract":"Energy consumption in data centers is growing rapidly in recent years. To realize the economic and flexible operation of data centers, this paper proposes a spatio-temporal coordinated operation strategy of data centers considering virtual storage system (VSS) via two-stage distributionally robust optimization. First, based on the dynamic thermal network of buildings and differentiated demands of cloud users in data centers, a comprehensive operation model with VSS is proposed. Then, considering uncertainties of general load demands from data centers and outdoor temperatures, a fuzzy set is deduced, using an imprecise Dirichlet model derived from historical data. This ensures confidence level satisfaction for uncertain sets of general load and outdoor temperatures. In addition, the spatio-temporal coordinated operation strategy of data centers considering virtual storage system via two-stage distributionally robust optimization that flexibly adjusts conservativeness through uncertainty regulation parameters. Finally, a Dynamic Accuracy Column and Constraint Generation (DA-C&CG) algorithm is developed for solving the proposed strategy. The results indicate that the proposed strategy can effectively enhance operational economics, computing efficiency and resilience by leveraging flexibility in cooling and cloud user loads within suitable server temperatures. Meanwhile, the DA-C&CG algorithm exhibits excellent solution performance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7343-7357"},"PeriodicalIF":7.9,"publicationDate":"2026-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147440586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-Mounted RIS-Assisted Legitimate Surveillance Over Maritime Low-Altitude Communication Networks 在海上低空通信网络上,无人机搭载的ris辅助合法监视
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-16 DOI: 10.1109/TNSE.2026.3665466
Wei Wang;Xu Hao;Lei Wu;Feng Zeng;Nan Zhao;Kanapathippillai Cumanan;Emil Björnson
This paper considers a challenging maritime low-altitude surveillance issue, in which, a legitimate monitor UAV intends to overhear a suspicious UAV-vessel link with the help of a jammer UAV. Both the suspicious receiver has the jamming detection ability and the jammer UAV is energy-constrained. To address these challenges, we propose a novel UAV-mounted reconfigurable intelligent surface (RIS) assisted approach, where the RIS is deployed on the jammer UAV to create an additional surveillance channel towards the legitimate UAV. Furthermore, the jammer UAV can also intelligently adjust its power allocation and flight trajectory to covertly disturb the suspicious transmission with the detection thresholds and the energy budgets. In such a setup, we consider a sum eavesdropping rate maximization problem of the legitimate UAV during all time slots. This formulated problem is solved by jointly optimizing the three-dimensional (3D) trajectory of the legitimate UAV, the reflecting phase shifts of the RIS, as well as the 3D trajectory and jamming power of the jammer UAV under the mobility, covertness, and power limitation constraints. We decompose the non-convex design problem into three subproblems and propose an iterative algorithm to find its approximated optimal solution by using the block coordinate descent method. In each iteration, we utilize the successive convex approximation and phase alignment techniques to handle these subproblems. Numerical simulation results are provided to validate the effectiveness and tremendous potential of UAV-mounted RIS in the maritime low-altitude surveillance.
本文考虑了一个具有挑战性的海上低空监视问题,其中合法的监视无人机打算在干扰无人机的帮助下偷听可疑的无人船连接。可疑接收机具有干扰检测能力,干扰无人机能量受限。为了应对这些挑战,我们提出了一种新型的无人机安装可重构智能表面(RIS)辅助方法,其中RIS部署在干扰无人机上,以创建针对合法无人机的额外监视通道。此外,干扰无人机还可以根据探测阈值和能量预算,智能调整功率分配和飞行轨迹,对可疑传输进行隐蔽干扰。在这种情况下,我们考虑了合法无人机在所有时隙的总和窃听率最大化问题。在机动性、隐蔽性和功率限制约束下,通过联合优化合法无人机的三维轨迹、RIS的反射相移以及干扰无人机的三维轨迹和干扰功率来解决该公式问题。将非凸设计问题分解为三个子问题,提出了一种用块坐标下降法求其近似最优解的迭代算法。在每次迭代中,我们利用连续凸逼近和相位对齐技术来处理这些子问题。数值仿真结果验证了无人机机载RIS在海上低空监视中的有效性和巨大潜力。
{"title":"UAV-Mounted RIS-Assisted Legitimate Surveillance Over Maritime Low-Altitude Communication Networks","authors":"Wei Wang;Xu Hao;Lei Wu;Feng Zeng;Nan Zhao;Kanapathippillai Cumanan;Emil Björnson","doi":"10.1109/TNSE.2026.3665466","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3665466","url":null,"abstract":"This paper considers a challenging maritime low-altitude surveillance issue, in which, a legitimate monitor UAV intends to overhear a suspicious UAV-vessel link with the help of a jammer UAV. Both the suspicious receiver has the jamming detection ability and the jammer UAV is energy-constrained. To address these challenges, we propose a novel UAV-mounted reconfigurable intelligent surface (RIS) assisted approach, where the RIS is deployed on the jammer UAV to create an additional surveillance channel towards the legitimate UAV. Furthermore, the jammer UAV can also intelligently adjust its power allocation and flight trajectory to covertly disturb the suspicious transmission with the detection thresholds and the energy budgets. In such a setup, we consider a sum eavesdropping rate maximization problem of the legitimate UAV during all time slots. This formulated problem is solved by jointly optimizing the three-dimensional (3D) trajectory of the legitimate UAV, the reflecting phase shifts of the RIS, as well as the 3D trajectory and jamming power of the jammer UAV under the mobility, covertness, and power limitation constraints. We decompose the non-convex design problem into three subproblems and propose an iterative algorithm to find its approximated optimal solution by using the block coordinate descent method. In each iteration, we utilize the successive convex approximation and phase alignment techniques to handle these subproblems. Numerical simulation results are provided to validate the effectiveness and tremendous potential of UAV-mounted RIS in the maritime low-altitude surveillance.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6944-6957"},"PeriodicalIF":7.9,"publicationDate":"2026-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EcoShield: A More Practical Rerouting-Based Defense Against Link Flooding Attacks EcoShield:一种更实用的基于重路由的链路泛洪攻击防御方法
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-13 DOI: 10.1109/TNSE.2026.3664638
Can Chen;Qinghao Wang;Ning Lu;Wenbo Shi;Zhiquan Liu
Link Flooding Attack (LFA) is a type of distributed denial-of-service attack that isolates the victim area from the network by indirectly overwhelming critical upstream links. This indirect nature forces the victim area to rely on upstream networks for collaborative defense against LFA. For upstream networks, rerouting serves as a rapid and effective defense strategy. However, each rerouting incurs costs for the upstream network, making it reluctant to assist the victim without compensation. Therefore, we propose EcoShield, in which rerouting is regarded as a tradable service and the victim can purchase from relevant networks when needed. To implement EcoShield, we face two challenges: building a collaboration platform to ensure fair service trading and minimizing the victim’s defense expense. To this end, we propose a blockchain-based collaborative architecture for rerouting service trading. Furthermore, we propose a cost-efficient collaborative rerouting scheme toward suspicious source domains, which effectively reduces the number of reroutings required, thereby reducing the victim’s expense. Finally, extensive experiments demonstrate that, while ensuring effective defense performance (with a botnet identification precision above 0.95 and recall above 0.6), EcoShield reduces the defense expense by at least 45% compared with prior works.
链路泛洪攻击(Link Flooding Attack, LFA)是一种分布式拒绝服务攻击,通过间接阻断上游关键链路,将受害区域与网络隔离开来。这种间接的性质迫使受害地区依靠上游网络来协同防御LFA。对于上游网络,重路由是一种快速有效的防御策略。然而,每次重新路由都会给上游网络带来成本,使其不愿意在没有补偿的情况下帮助受害者。因此,我们提出EcoShield,将重路由视为一种可交易的服务,受害者可以在需要时从相关网络购买。为了实施EcoShield,我们面临着两个挑战:建立一个协作平台,以确保公平的服务交易和最大限度地减少受害者的辩护费用。为此,我们提出了一种基于区块链的协作架构,用于重新路由服务交易。此外,我们提出了一种具有成本效益的针对可疑源域的协同重路由方案,该方案有效地减少了所需的重路由次数,从而降低了受害者的费用。最后,大量的实验表明,在确保有效防御性能(僵尸网络识别精度超过0.95,召回率超过0.6)的同时,与之前的工作相比,EcoShield将防御费用降低了至少45%。
{"title":"EcoShield: A More Practical Rerouting-Based Defense Against Link Flooding Attacks","authors":"Can Chen;Qinghao Wang;Ning Lu;Wenbo Shi;Zhiquan Liu","doi":"10.1109/TNSE.2026.3664638","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664638","url":null,"abstract":"Link Flooding Attack (LFA) is a type of distributed denial-of-service attack that isolates the victim area from the network by indirectly overwhelming critical upstream links. This indirect nature forces the victim area to rely on upstream networks for collaborative defense against LFA. For upstream networks, rerouting serves as a rapid and effective defense strategy. However, each rerouting incurs costs for the upstream network, making it reluctant to assist the victim without compensation. Therefore, we propose EcoShield, in which rerouting is regarded as a tradable service and the victim can purchase from relevant networks when needed. To implement EcoShield, we face two challenges: building a collaboration platform to ensure fair service trading and minimizing the victim’s defense expense. To this end, we propose a blockchain-based collaborative architecture for rerouting service trading. Furthermore, we propose a cost-efficient collaborative rerouting scheme toward suspicious source domains, which effectively reduces the number of reroutings required, thereby reducing the victim’s expense. Finally, extensive experiments demonstrate that, while ensuring effective defense performance (with a botnet identification <italic>precision</i> above 0.95 and <italic>recall</i> above 0.6), EcoShield reduces the defense expense by at least 45% compared with prior works.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7014-7030"},"PeriodicalIF":7.9,"publicationDate":"2026-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneity-Aware Proactive MAC for Efficient Resource Allocation in WBANs 基于异构感知的wban资源有效分配的主动MAC
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-13 DOI: 10.1109/TNSE.2026.3664406
Yurui Zhang;Xuxun Liu;Anfeng Liu
Efficient Medium Access Control (MAC) protocols are essential for reliable and real-time data transmission in Wireless Body Area Networks (WBANs). However, existing solutions, such as the IEEE 802.15.6 standard and other adaptive TDMA protocols, fail to adequately address the inherent challenges of node heterogeneity and network dynamics, which lead to inefficient resource allocation, unreliable emergency handling, and inflexible Quality-of-Service (QoS) provisioning. In this article, we propose a Heterogeneity-Aware Proactive MAC (HAP-MAC) protocol that introduces a novel three-tier holistic framework for resource allocation. Unlike conventional methods reliant on static priorities or slow centralized adaptations, HAP-MAC enables intelligent and autonomous node-state adaptation based on real-time buffer status, delay constraints, and channel quality. It employs a predictive channel access mechanism for microsecond-scale arbitration and a sophisticated multi-dimensional priority framework that comprehensively evaluates traffic characteristics, data volume, buffer conditions, and time sensitivity, thus ensuring precise QoS differentiation for diverse application requirements. Extensive experimental results demonstrate that HAP-MAC delivers significant performance advantages over state-of-the-art protocols in terms of total throughput, packet delivery rate, average delay, and channel utilization. HAP-MAC exhibits a unique ability to simultaneously address node heterogeneity and network dynamics, making it an ideal solution for mission-critical healthcare monitoring applications.
高效的介质访问控制(MAC)协议是无线体域网络(wban)中可靠、实时数据传输的关键。然而,现有的解决方案,如IEEE 802.15.6标准和其他自适应TDMA协议,未能充分解决节点异构性和网络动态的固有挑战,从而导致资源分配效率低下、紧急处理不可靠和服务质量(QoS)供应不灵活。在本文中,我们提出了一种异构感知的主动MAC (HAP-MAC)协议,该协议引入了一种新的三层整体资源分配框架。与依赖静态优先级或缓慢集中式自适应的传统方法不同,HAP-MAC支持基于实时缓冲状态、延迟约束和信道质量的智能和自主节点状态自适应。采用微秒级仲裁的预测通道接入机制和综合评估流量特征、数据量、缓冲条件和时间敏感性的复杂多维优先级框架,确保了针对不同应用需求的精准QoS区分。大量的实验结果表明,在总吞吐量、数据包传输速率、平均延迟和信道利用率方面,HAP-MAC比最先进的协议具有显著的性能优势。HAP-MAC展示了同时处理节点异构性和网络动态的独特能力,使其成为关键任务医疗保健监控应用程序的理想解决方案。
{"title":"Heterogeneity-Aware Proactive MAC for Efficient Resource Allocation in WBANs","authors":"Yurui Zhang;Xuxun Liu;Anfeng Liu","doi":"10.1109/TNSE.2026.3664406","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664406","url":null,"abstract":"Efficient Medium Access Control (MAC) protocols are essential for reliable and real-time data transmission in Wireless Body Area Networks (WBANs). However, existing solutions, such as the IEEE 802.15.6 standard and other adaptive TDMA protocols, fail to adequately address the inherent challenges of node heterogeneity and network dynamics, which lead to inefficient resource allocation, unreliable emergency handling, and inflexible Quality-of-Service (QoS) provisioning. In this article, we propose a Heterogeneity-Aware Proactive MAC (HAP-MAC) protocol that introduces a novel three-tier holistic framework for resource allocation. Unlike conventional methods reliant on static priorities or slow centralized adaptations, HAP-MAC enables intelligent and autonomous node-state adaptation based on real-time buffer status, delay constraints, and channel quality. It employs a predictive channel access mechanism for microsecond-scale arbitration and a sophisticated multi-dimensional priority framework that comprehensively evaluates traffic characteristics, data volume, buffer conditions, and time sensitivity, thus ensuring precise QoS differentiation for diverse application requirements. Extensive experimental results demonstrate that HAP-MAC delivers significant performance advantages over state-of-the-art protocols in terms of total throughput, packet delivery rate, average delay, and channel utilization. HAP-MAC exhibits a unique ability to simultaneously address node heterogeneity and network dynamics, making it an ideal solution for mission-critical healthcare monitoring applications.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6843-6854"},"PeriodicalIF":7.9,"publicationDate":"2026-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147299497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ParallelGSE: Efficient and Secure Shortest Path Search on Encrypted Graphs 并行gse:高效安全的加密图最短路径搜索
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-12 DOI: 10.1109/TNSE.2026.3664315
Qing Fan;Weixiao Wang;Chuan Zhang;Zhitao Guan;Yong Xie;Ming Lu;Liehuang Zhu
Graph searchable encryption (GSE) for shortest path queries allows users to discover the closest connection between two individuals in encrypted social network graphs, while safeguarding both social data security and the privacy of user queries. The static GSE is commonly favored for its higher efficiency, while it faces significant challenges in resisting query recovery attacks. In contrast, the dynamic GSE is better suited for changing real world, but enhancing its search efficiency remains a formidable challenge. In this paper, we propose the ParallelGSE, a flexible graph partitioning and parallel search framework that supports both dynamic and static encrypted social graphs, striking a balance between query privacy and practical implementation. ParallelGSE partitions the original graph into multiple subgraphs, distributes them across several semi-honest servers, and performs searches in parallel without relying on a trusted server. Formal security reduction demonstrates ParallelGSE is resistant to isomorphic query recovery attacks. Simulated experiments on seven real-world graph datasets validate rationality of graph partition and improvements of storage, computation and communication costs. Especially, compared to the state-of-the-art (SOTA) static PathGES (ACM CCS 2024) and dynamic GraphShield (IEEE TKDE 2022), the search efficiency of static ParallelGSE can be 3 orders of magnitude faster than that of PathGSE, while dynamic ParallelGSE achieves over $20times$ greater search efficiency than GraphShield.
针对最短路径查询的图形可搜索加密(GSE)允许用户在加密的社交网络图形中发现两个人之间最密切的联系,同时保护社交数据安全和用户查询的隐私。静态GSE通常因其较高的效率而受到青睐,但它在抵抗查询恢复攻击方面面临着重大挑战。相比之下,动态GSE更适合于变化的现实世界,但提高其搜索效率仍然是一个艰巨的挑战。在本文中,我们提出了ParallelGSE,这是一个灵活的图划分和并行搜索框架,支持动态和静态加密社交图,在查询隐私和实际实现之间取得了平衡。ParallelGSE将原始图划分为多个子图,将它们分布在几个半诚实的服务器上,并并行执行搜索,而不依赖于受信任的服务器。形式化的安全性缩减证明了ParallelGSE能够抵抗同构查询恢复攻击。在7个真实的图数据集上进行了仿真实验,验证了图划分的合理性以及存储、计算和通信成本的提高。特别是,与最先进的(SOTA)静态PathGES (ACM CCS 2024)和动态GraphShield (IEEE TKDE 2022)相比,静态ParallelGSE的搜索效率比PathGSE快3个数量级,而动态ParallelGSE的搜索效率比GraphShield高20倍以上。
{"title":"ParallelGSE: Efficient and Secure Shortest Path Search on Encrypted Graphs","authors":"Qing Fan;Weixiao Wang;Chuan Zhang;Zhitao Guan;Yong Xie;Ming Lu;Liehuang Zhu","doi":"10.1109/TNSE.2026.3664315","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664315","url":null,"abstract":"Graph searchable encryption (GSE) for shortest path queries allows users to discover the closest connection between two individuals in encrypted social network graphs, while safeguarding both social data security and the privacy of user queries. The static GSE is commonly favored for its higher efficiency, while it faces significant challenges in resisting query recovery attacks. In contrast, the dynamic GSE is better suited for changing real world, but enhancing its search efficiency remains a formidable challenge. In this paper, we propose the ParallelGSE, a flexible graph partitioning and parallel search framework that supports both dynamic and static encrypted social graphs, striking a balance between query privacy and practical implementation. ParallelGSE partitions the original graph into multiple subgraphs, distributes them across several semi-honest servers, and performs searches in parallel without relying on a trusted server. Formal security reduction demonstrates ParallelGSE is resistant to isomorphic query recovery attacks. Simulated experiments on seven real-world graph datasets validate rationality of graph partition and improvements of storage, computation and communication costs. Especially, compared to the state-of-the-art (SOTA) static PathGES (ACM CCS 2024) and dynamic GraphShield (IEEE TKDE 2022), the search efficiency of static ParallelGSE can be 3 orders of magnitude faster than that of PathGSE, while dynamic ParallelGSE achieves over <inline-formula><tex-math>$20times$</tex-math></inline-formula> greater search efficiency than GraphShield.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7031-7050"},"PeriodicalIF":7.9,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-Grained Detection for Bitcoin Mixing Services Using Heterogeneous Representation Learning 基于异构表示学习的比特币混合服务细粒度检测
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-12 DOI: 10.1109/TNSE.2026.3664284
Yan Wu;Jiahang Sun;Zhen Li;Cong Wu;Zhe Guo;Yi Ding;Jun Jin;Jincheng An;Chuan Zhang;Zijian Zhang;Meng Li;Liehuang Zhu
With the widespread adoption of cryptocurrencies, exemplified by Bitcoin, mixing services have been increasingly misused for illicit activities such as fraud, extortion, and money laundering. These services cut off the direct link between input and output addresses to conceal publicly available transaction traces on the blockchain, thereby evading regulatory investigations. In recent years, significant efforts have been made to deanonymize Bitcoin mixing services (BMS). While these efforts have yielded some achievements in service detection, they still face several challenges, such as vague theoretical definitions, coarse-grained identification capabilities, and insufficient labeling information. To address these challenges, this paper formalizes the notion of BMS with a syntax, security model, and goals, providing a universal definition for evaluating service anonymity and detection feasibility. We also propose a fine-grained detection framework for BMS, called BMS-FDET, which leverages heterogeneous Bitcoin transactional networks and multiple attention mechanisms to identify mixing transactions across different services. To improve the model’s detection capabilities and compare performance, a sufficient ground-truth dataset with over 596,200 entries covering more than 15 mixing services is built from extensive data sources. Comprehensive experiments demonstrate the superiority of BMS-FDET over existing methods.
随着以比特币为代表的加密货币的广泛采用,混合服务越来越多地被滥用于欺诈、勒索和洗钱等非法活动。这些服务切断了输入和输出地址之间的直接联系,以隐藏区块链上公开可用的交易痕迹,从而逃避监管调查。近年来,人们在比特币混合服务(BMS)的去匿名化方面做出了重大努力。虽然这些努力在服务检测方面取得了一些成果,但它们仍然面临着一些挑战,如模糊的理论定义、粗粒度的识别能力和不充分的标记信息。为了解决这些挑战,本文用语法、安全模型和目标形式化了BMS的概念,为评估服务匿名性和检测可行性提供了一个通用的定义。我们还提出了BMS的细粒度检测框架,称为BMS- fdet,它利用异构比特币交易网络和多种关注机制来识别跨不同服务的混合交易。为了提高模型的检测能力和比较性能,从广泛的数据源构建了一个足够的真实数据集,其中包含超过596,200个条目,涵盖超过15种混合服务。综合实验证明了BMS-FDET相对于现有方法的优越性。
{"title":"Fine-Grained Detection for Bitcoin Mixing Services Using Heterogeneous Representation Learning","authors":"Yan Wu;Jiahang Sun;Zhen Li;Cong Wu;Zhe Guo;Yi Ding;Jun Jin;Jincheng An;Chuan Zhang;Zijian Zhang;Meng Li;Liehuang Zhu","doi":"10.1109/TNSE.2026.3664284","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664284","url":null,"abstract":"With the widespread adoption of cryptocurrencies, exemplified by Bitcoin, mixing services have been increasingly misused for illicit activities such as fraud, extortion, and money laundering. These services cut off the direct link between input and output addresses to conceal publicly available transaction traces on the blockchain, thereby evading regulatory investigations. In recent years, significant efforts have been made to deanonymize Bitcoin mixing services (BMS). While these efforts have yielded some achievements in service detection, they still face several challenges, such as vague theoretical definitions, coarse-grained identification capabilities, and insufficient labeling information. To address these challenges, this paper formalizes the notion of BMS with a syntax, security model, and goals, providing a universal definition for evaluating service anonymity and detection feasibility. We also propose a fine-grained detection framework for BMS, called BMS-FDET, which leverages heterogeneous Bitcoin transactional networks and multiple attention mechanisms to identify mixing transactions across different services. To improve the model’s detection capabilities and compare performance, a sufficient ground-truth dataset with over 596,200 entries covering more than 15 mixing services is built from extensive data sources. Comprehensive experiments demonstrate the superiority of BMS-FDET over existing methods.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7069-7083"},"PeriodicalIF":7.9,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Jamming and Transmission Rate Optimization for Multi-Jammer Assisted UAV Covert Communications With Imperfect CSI 非完美CSI下多干扰机辅助无人机隐蔽通信联合干扰与传输速率优化
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-12 DOI: 10.1109/TNSE.2026.3664087
Zhijun Han;Yiqing Zhou;Ningzhe Shi;Jingya Yang;Ling Liu;Jinglin Shi;Shuwu Chen
Information security and privacy are critical for unmanned aerial vehicles (UAV) based low-altitude networks. To enhance the security of the UAV transmitter, this paper investigates the jammer-assisted UAV covert communication systems with imperfect channel state information (CSI), where a subset of friendly jammers is selected to send artificial noise (AN) to confuse the warden. It is important to jointly optimize the jammer selection and jamming power, as AN sent by friendly jammers will interfere with the warden and receiver, simultaneously. However, existing channel-aware schemes work with a perfect CSI of the transmitter-to-receiver and jammer-to-receiver links, which is impractical in low-altitude networks. Therefore, this paper concerns the imperfect CSI of the transmitter-to-receiver link, and the channel distribution information (CDI) of both the transmitter-to-warden and jammer-related links. First, given the imperfect CSI, the warden's average detection error probability (WADEP) is analyzed. Then, given that WADEP is higher than the covertness constraint, the covert throughput is analytically derived and maximized by jointly optimizing the jammer selection, jamming power, and transmission rate (J-JamSPRImCSI). Since the optimization problem is NP-hard, a two-step Jensen's inequality based algorithm is proposed to provide a heuristic solution (2-Step-JIHA). Numerical results show that the proposed 2-Step-JIHA can provide a near optimal covert throughput with a lower complexity. Moreover, when the CSI is imperfect, compared to the existing channel-aware scheme, the proposed J-JamSPR-ImCSI with 2-Step-JIHA can improve the covert throughput by 54.26$%$, when the covertness constraint is 0.9.
对于基于无人机的低空网络来说,信息安全和隐私至关重要。为了提高无人机发射机的安全性,研究了不完全信道状态信息(CSI)条件下干扰机辅助无人机隐蔽通信系统,该系统选择一组友好干扰机发送人工噪声(AN)来迷惑管理员。由于友方干扰机发出的AN信号会同时对监狱长和接收机产生干扰,因此需要共同优化干扰机的选择和干扰功率。然而,现有的信道感知方案在发射机到接收机和干扰机到接收机链路的完美CSI下工作,这在低空网络中是不切实际的。因此,本文关注的是发射机到接收机链路的不完全CSI,以及发射机到监控器和干扰机相关链路的信道分布信息(CDI)。首先,在不完全CSI条件下,分析了监狱长的平均检测误差概率(WADEP)。然后,考虑WADEP高于隐蔽性约束,通过联合优化干扰机选择、干扰功率和传输速率(j - jamsprrimcsi),解析导出隐蔽吞吐量并使其最大化。由于优化问题是np困难的,提出了一种基于两步Jensen不等式的算法来提供启发式解(2-Step-JIHA)。数值结果表明,所提出的2-Step-JIHA算法能够以较低的复杂度提供接近最优的隐蔽吞吐量。此外,在CSI不完善的情况下,与现有的信道感知方案相比,当隐蔽性约束为0.9时,采用2-Step-JIHA的j - jampr - imcsi方案可将隐蔽吞吐量提高54.26%。
{"title":"Joint Jamming and Transmission Rate Optimization for Multi-Jammer Assisted UAV Covert Communications With Imperfect CSI","authors":"Zhijun Han;Yiqing Zhou;Ningzhe Shi;Jingya Yang;Ling Liu;Jinglin Shi;Shuwu Chen","doi":"10.1109/TNSE.2026.3664087","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3664087","url":null,"abstract":"Information security and privacy are critical for unmanned aerial vehicles (UAV) based low-altitude networks. To enhance the security of the UAV transmitter, this paper investigates the jammer-assisted UAV covert communication systems with imperfect channel state information (CSI), where a subset of friendly jammers is selected to send artificial noise (AN) to confuse the warden. It is important to jointly optimize the jammer selection and jamming power, as AN sent by friendly jammers will interfere with the warden and receiver, simultaneously. However, existing channel-aware schemes work with a perfect CSI of the transmitter-to-receiver and jammer-to-receiver links, which is impractical in low-altitude networks. Therefore, this paper concerns the imperfect CSI of the transmitter-to-receiver link, and the channel distribution information (CDI) of both the transmitter-to-warden and jammer-related links. First, given the imperfect CSI, the warden's average detection error probability (WADEP) is analyzed. Then, given that WADEP is higher than the covertness constraint, the covert throughput is analytically derived and maximized by jointly optimizing the jammer selection, jamming power, and transmission rate (J-JamSPRImCSI). Since the optimization problem is NP-hard, a two-step Jensen's inequality based algorithm is proposed to provide a heuristic solution (2-Step-JIHA). Numerical results show that the proposed 2-Step-JIHA can provide a near optimal covert throughput with a lower complexity. Moreover, when the CSI is imperfect, compared to the existing channel-aware scheme, the proposed J-JamSPR-ImCSI with 2-Step-JIHA can improve the covert throughput by 54.26<inline-formula><tex-math>$%$</tex-math></inline-formula>, when the covertness constraint is 0.9.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6958-6976"},"PeriodicalIF":7.9,"publicationDate":"2026-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixing Drone Auth: A Practical and Secure, Blockchain-Enabled UAV Authentication Scheme 固定无人机认证:一个实用和安全的,支持区块链的无人机认证方案
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-11 DOI: 10.1109/TNSE.2026.3663713
Jiayin Wang;Chang Xu;Liehuang Zhu;Junke Duan
Uncrewed aerial vehicles (UAVs) are increasingly deployed in safety-critical and privacy-sensitive applications, including infrastructure inspection, precision agriculture, emergency response, and on-demand connectivity. However, UAVs' mobility and intermittent connectivity expose them to diverse security threats, making robust yet efficient authentication and key agreement (AKA) essential. We present PSB-UAKA, a Practical and Secure Blockchain-enabled UAV Authentication and Key Agreement scheme. PSB-UAKA combines physical unclonable functions (PUFs) with fuzzy extractors to avoid maintaining a challenge–response pair (CRP) database while improving resilience to device-capture attacks. It further leverages Merkle-tree proofs for lightweight authorization verification and adopts session-bound pseudonym rotation to support unlinkability and tolerate desynchronization. We formalize a UAV-specific threat model and prove session authenticity and key indistinguishability in the Real-or-Random (RoR) framework. Our comparative analysis shows that PSB-UAKA provides roughly 25% broader security coverage than representative baselines, with notable gains in anonymity and desynchronization resilience. Experimental results indicate low computational overhead (below 0.066 ms on user devices and 1.436 ms on UAVs) and up to 54% reduction in UAV-side storage. Finally, extensive NS-3 simulations under realistic mobility and wireless conditions demonstrate lower authentication latency and stable throughput relative to state-of-the-art schemes, suggesting that PSB-UAKA is practical for real-world UAV deployments.
无人驾驶飞行器(uav)越来越多地部署在安全关键和隐私敏感应用中,包括基础设施检查、精准农业、应急响应和按需连接。然而,无人机的机动性和间歇性连接使其面临各种安全威胁,因此强大而高效的身份验证和密钥协议(AKA)至关重要。我们提出了PSB-UAKA,一个实用和安全的区块链无人机认证和密钥协议方案。PSB-UAKA将物理不可克隆功能(puf)与模糊提取器相结合,以避免维护挑战响应对(CRP)数据库,同时提高对设备捕获攻击的弹性。它进一步利用默克尔树证明进行轻量级授权验证,并采用会话绑定的假名旋转来支持不可链接性和容忍去同步。我们形式化了一个针对无人机的威胁模型,并在Real-or-Random (RoR)框架中证明了会话真实性和密钥不可分辨性。我们的比较分析表明,PSB-UAKA提供的安全覆盖范围比代表性基线扩大了大约25%,在匿名性和去同步弹性方面有显著提高。实验结果表明,低计算开销(在用户设备上低于0.066 ms,在无人机上低于1.436 ms)和高达54%的无人机侧存储减少。最后,在现实机动性和无线条件下的广泛NS-3模拟表明,相对于最先进的方案,PSB-UAKA具有更低的身份验证延迟和稳定的吞吐量,这表明PSB-UAKA对于现实世界的无人机部署是实用的。
{"title":"Fixing Drone Auth: A Practical and Secure, Blockchain-Enabled UAV Authentication Scheme","authors":"Jiayin Wang;Chang Xu;Liehuang Zhu;Junke Duan","doi":"10.1109/TNSE.2026.3663713","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3663713","url":null,"abstract":"Uncrewed aerial vehicles (UAVs) are increasingly deployed in safety-critical and privacy-sensitive applications, including infrastructure inspection, precision agriculture, emergency response, and on-demand connectivity. However, UAVs' mobility and intermittent connectivity expose them to diverse security threats, making robust yet efficient authentication and key agreement (AKA) essential. We present PSB-UAKA, a <underline>P</u>ractical and <underline>S</u>ecure <underline>B</u>lockchain-enabled <underline>U</u>AV <underline>A</u>uthentication and <underline>K</u>ey <underline>A</u>greement scheme. PSB-UAKA combines physical unclonable functions (PUFs) with fuzzy extractors to avoid maintaining a challenge–response pair (CRP) database while improving resilience to device-capture attacks. It further leverages Merkle-tree proofs for lightweight authorization verification and adopts session-bound pseudonym rotation to support unlinkability and tolerate desynchronization. We formalize a UAV-specific threat model and prove session authenticity and key indistinguishability in the Real-or-Random (RoR) framework. Our comparative analysis shows that PSB-UAKA provides roughly 25% broader security coverage than representative baselines, with notable gains in anonymity and desynchronization resilience. Experimental results indicate low computational overhead (below 0.066 ms on user devices and 1.436 ms on UAVs) and up to 54% reduction in UAV-side storage. Finally, extensive NS-3 simulations under realistic mobility and wireless conditions demonstrate lower authentication latency and stable throughput relative to state-of-the-art schemes, suggesting that PSB-UAKA is practical for real-world UAV deployments.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7051-7068"},"PeriodicalIF":7.9,"publicationDate":"2026-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swarm Intelligence Based Social-Aware Edge Caching in D2D-Enabled Wireless Networks 基于群体智能的二维无线网络社会感知边缘缓存
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-10 DOI: 10.1109/TNSE.2026.3663170
Jianbo Du;Yuting Wang;Jing Jiang;Defeng Ren;Yuan Gao;Geng Sun;Xiaoli Chu
This paper investigates social-aware edge caching in device-to-device (D2D) networks with multiple user equipments (UEs). Each file is encoded hierarchically and divided into multiple layers of sub-files, allowing each UE to cache partial layers and share them with others via D2D links. The system operates in discrete time slots, where contents can be retrieved in the following order: local cache, socially-connected D2D peers, and remote content servers. D2D sharing is restricted to users with social ties, quantified by a multi-attribute model combining interest similarity and social trust. We intend to maximize total backhaul bandwidth savings by jointly optimizing content placement, D2D user pairing, and base station (BS) bandwidth allocation, under constraints on storage capacity, unique pairing, total BS bandwidth, and service delay, etc. Given the NP-hardness of this joint optimization problem, we propose an Improved Constrained Fireworks Algorithm (ICFWA) that efficiently explores the solution space with low complexity and strong global search capability. In the algorithm, each firework or spark represents a feasible solution encompassing the three types of decision variables. Three explosion strategies are designed by modifying one category of variables for local search, and Gaussian mutation simultaneously modifies all variables to enhance global exploration. Simulation results demonstrate that ICFWA exhibits strong convergence performance and significantly outperforms baseline methods in maximizing backhaul bandwidth savings.
本文研究了具有多用户设备(ue)的设备到设备(D2D)网络中的社会感知边缘缓存。每个文件都是分层编码的,并分成多层子文件,允许每个UE缓存部分层,并通过D2D链接与其他UE共享。系统在离散的时隙中运行,其中内容可以按照以下顺序检索:本地缓存、社会连接的D2D对等体和远程内容服务器。D2D共享仅限于具有社会关系的用户,通过结合兴趣相似性和社会信任的多属性模型进行量化。我们打算在存储容量、唯一配对、总BS带宽和服务延迟等约束下,通过共同优化内容放置、D2D用户配对和基站(BS)带宽分配,最大限度地节省总回程带宽。针对该联合优化问题的np -硬度,提出了一种改进的约束烟花算法(ICFWA),该算法以较低的复杂度和较强的全局搜索能力高效地探索解空间。在该算法中,每个烟花或火花代表一个包含三种决策变量的可行解。通过修改一类变量进行局部搜索,设计了三种爆炸策略,高斯突变同时修改所有变量以增强全局搜索。仿真结果表明,ICFWA具有较强的收敛性能,在最大限度地节省回程带宽方面明显优于基线方法。
{"title":"Swarm Intelligence Based Social-Aware Edge Caching in D2D-Enabled Wireless Networks","authors":"Jianbo Du;Yuting Wang;Jing Jiang;Defeng Ren;Yuan Gao;Geng Sun;Xiaoli Chu","doi":"10.1109/TNSE.2026.3663170","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3663170","url":null,"abstract":"This paper investigates social-aware edge caching in device-to-device (D2D) networks with multiple user equipments (UEs). Each file is encoded hierarchically and divided into multiple layers of sub-files, allowing each UE to cache partial layers and share them with others via D2D links. The system operates in discrete time slots, where contents can be retrieved in the following order: local cache, socially-connected D2D peers, and remote content servers. D2D sharing is restricted to users with social ties, quantified by a multi-attribute model combining interest similarity and social trust. We intend to maximize total backhaul bandwidth savings by jointly optimizing content placement, D2D user pairing, and base station (BS) bandwidth allocation, under constraints on storage capacity, unique pairing, total BS bandwidth, and service delay, etc. Given the NP-hardness of this joint optimization problem, we propose an Improved Constrained Fireworks Algorithm (ICFWA) that efficiently explores the solution space with low complexity and strong global search capability. In the algorithm, each firework or spark represents a feasible solution encompassing the three types of decision variables. Three explosion strategies are designed by modifying one category of variables for local search, and Gaussian mutation simultaneously modifies all variables to enhance global exploration. Simulation results demonstrate that ICFWA exhibits strong convergence performance and significantly outperforms baseline methods in maximizing backhaul bandwidth savings.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"7283-7302"},"PeriodicalIF":7.9,"publicationDate":"2026-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147440525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why Not Wait and See: An Effective BDoS Mitigation Strategy From a Two-Stage Evolutionary Game Perspective 为什么不等等看:从两阶段进化博弈的角度来看,有效的BDoS缓解策略
IF 7.9 2区 计算机科学 Q1 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2026-02-10 DOI: 10.1109/TNSE.2026.3663284
Qinglin Yang;Boya Wang;Ruixin Huang;Yuan Zhou;Yuan Liu;Zhihong Tian
Bitcoin’s security is based on the assumption that a sufficient amount of benign computing power participates in “mining” new blocks by generating publicly verifiable proofs. The blockchain denial of service (BDoS) attackers generate a valid proof but withhold the whole block, resulting in honest miners stopping the participation service but waiting for the exposure of the new block, and attackers achieving 21% computing power would significantly threaten the security of blockchain applications. We find that the threshold value 21% is based on the assumption that honest miners are only concerned with current short-term benefits, i.e., they have an immediate tendency to stop mining once a BDoS attack occurs and their short-term gains decline. However, similar to the altruistic behavior observed in biological systems, certain blockchain nodes exhibit a form of rational altruism during attacks. When the blockchain system is under threat, these nodes prioritize the long-term stability of the network and choose to continue mining honestly. This phenomenon has not yet been well studied. Motivated by the above observation, we propose a resumption strategy that enables honest miners to resume mining after pausing ($S_{text{CMP}}$) for a while, mitigating BDoS attacks and maintaining blockchain security. Subsequently, we formalize a two-stage evolutionary game model to quantitatively analyze the defensive capacity against BDoS with the $S_{text{CMP}}$ strategy. Theoretical analysis shows that BDoS attackers can only successfully stop blockchain mining when the attacking power and profit factor satisfy a certain condition $text{Cd}_{dead}(gamma,w,alpha _{A},c)$, where our proposed strategy enables the attack mining power threshold to be raised to 33.1% approaching 1/3, which is the upper bound of the byzantine false tolerance. Real-world experimental results also indicate that the Bitcoin system would be subject to a BDoS attack by 2028.
比特币的安全性是基于这样一个假设:通过生成可公开验证的证据,有足够数量的良性计算能力参与“挖掘”新区块。b区块链拒绝服务(BDoS)攻击者生成有效证明,但保留整个区块,导致诚实的矿工停止参与服务,但等待新区块的暴露,攻击者获得21% computing power would significantly threaten the security of blockchain applications. We find that the threshold value 21% is based on the assumption that honest miners are only concerned with current short-term benefits, i.e., they have an immediate tendency to stop mining once a BDoS attack occurs and their short-term gains decline. However, similar to the altruistic behavior observed in biological systems, certain blockchain nodes exhibit a form of rational altruism during attacks. When the blockchain system is under threat, these nodes prioritize the long-term stability of the network and choose to continue mining honestly. This phenomenon has not yet been well studied. Motivated by the above observation, we propose a resumption strategy that enables honest miners to resume mining after pausing ($S_{text{CMP}}$) for a while, mitigating BDoS attacks and maintaining blockchain security. Subsequently, we formalize a two-stage evolutionary game model to quantitatively analyze the defensive capacity against BDoS with the $S_{text{CMP}}$ strategy. Theoretical analysis shows that BDoS attackers can only successfully stop blockchain mining when the attacking power and profit factor satisfy a certain condition $text{Cd}_{dead}(gamma,w,alpha _{A},c)$, where our proposed strategy enables the attack mining power threshold to be raised to 33.1% approaching 1/3, which is the upper bound of the byzantine false tolerance. Real-world experimental results also indicate that the Bitcoin system would be subject to a BDoS attack by 2028.
{"title":"Why Not Wait and See: An Effective BDoS Mitigation Strategy From a Two-Stage Evolutionary Game Perspective","authors":"Qinglin Yang;Boya Wang;Ruixin Huang;Yuan Zhou;Yuan Liu;Zhihong Tian","doi":"10.1109/TNSE.2026.3663284","DOIUrl":"https://doi.org/10.1109/TNSE.2026.3663284","url":null,"abstract":"Bitcoin’s security is based on the assumption that a sufficient amount of benign computing power participates in “mining” new blocks by generating publicly verifiable proofs. The blockchain denial of service (BDoS) attackers generate a valid proof but withhold the whole block, resulting in honest miners stopping the participation service but waiting for the exposure of the new block, and attackers achieving 21% computing power would significantly threaten the security of blockchain applications. We find that the threshold value 21% is based on the assumption that honest miners are only concerned with current short-term benefits, i.e., they have an immediate tendency to stop mining once a BDoS attack occurs and their short-term gains decline. However, similar to the altruistic behavior observed in biological systems, certain blockchain nodes exhibit a form of rational altruism during attacks. When the blockchain system is under threat, these nodes prioritize the long-term stability of the network and choose to continue mining honestly. This phenomenon has not yet been well studied. Motivated by the above observation, we propose a resumption strategy that enables honest miners to resume mining after pausing (<inline-formula><tex-math>$S_{text{CMP}}$</tex-math></inline-formula>) for a while, mitigating BDoS attacks and maintaining blockchain security. Subsequently, we formalize a two-stage evolutionary game model to quantitatively analyze the defensive capacity against BDoS with the <inline-formula><tex-math>$S_{text{CMP}}$</tex-math></inline-formula> strategy. Theoretical analysis shows that BDoS attackers can only successfully stop blockchain mining when the attacking power and profit factor satisfy a certain condition <inline-formula><tex-math>$text{Cd}_{dead}(gamma,w,alpha _{A},c)$</tex-math></inline-formula>, where our proposed strategy enables the attack mining power threshold to be raised to 33.1% approaching 1/3, which is the upper bound of the byzantine false tolerance. Real-world experimental results also indicate that the Bitcoin system would be subject to a BDoS attack by 2028.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"13 ","pages":"6809-6826"},"PeriodicalIF":7.9,"publicationDate":"2026-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147362316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Network Science and Engineering
全部 Carbon Balance Manage. Geostand. Geoanal. Res. Global Biogeochem. Cycles Nat. Geosci. OCEAN SCI J Fossil Rec. GEOHERITAGE Appl. Geochem. ACTA GEOL POL Quat. Res. Precambrian Res. J. Archaeol. Sci. IZV-PHYS SOLID EART+ J. Afr. Earth. Sci. GEOCHEM GEOPHY GEOSY FACIES Geol. J. Solid Earth NEUES JB MINER ABH Permafrost Periglacial Processes PERIOD MINERAL Weather Forecasting GEOCHEM-EXPLOR ENV A Acta Geod. Geophys. Asia-Pac. J. Atmos. Sci. OCEANOLOGY+ GROUNDWATER J. Geol. Soc. India Photogramm. Eng. Remote Sens. JOKULL J. Earth Sci. Andean Geol. ESTUAR COAST SHELF S Org. Geochem. Prog. Oceanogr. Comput. Geosci. TECTONICS J PALAEOGEOG-ENGLISH Acta Oceanolog. Sin. Aquat. Geochem. ITAL J REMOTE SENS Z DTSCH GES GEOWISS Geol. Ore Deposits Helgol. Mar. Res. Geosci. Model Dev. Astin Bull. Nonlinear Processes Geophys. SPACE WEATHER J. Adv. Model. Earth Syst. N. Z. J. Geol. Geophys. ARCT ANTARCT ALP RES J. Clim. Atmos. Meas. Tech. Appl. Clay Sci. Am. J. Phys. Anthropol. AAPG Bull. Rev Financ Stud Miner. Deposita ARCHAEOMETRY Stud. Geophys. Geod. Aust. J. Earth Sci. J. Geog. Sci. Atmos. Chem. Phys. Big Earth Data Int. J. Biometeorol. Ann. Glaciol. Nat. Hazards Earth Syst. Sci. Atmos. Res. ACTA PETROL SIN Acta Geochimica ACTA GEOL SIN-ENGL Adv. Atmos. Sci. Geochem. Int. Basin Res. Acta Geophys. J. Atmos. Chem. J. Atmos. Sol. Terr. Phys. Archaeol. Anthropol. Sci. Geophys. Prospect. J. Hydrol. Geochim. Cosmochim. Acta CARNETS GEOL Vadose Zone J. J. Sea Res. ATMOSPHERE-BASEL Hydrogeol. J. Terra Nova J. Meteorolog. Res. Hydrol. Processes Mon. Weather Rev. J. Earth Syst. Sci. Annu. Rev. Earth Planet. Sci. Turk. J. Earth Sci. GEOL BELG Geomag. Aeron. PALAEOGEOGR PALAEOCL J APPL METEOROL CLIM Adv. Meteorol. PETROLOGY+ J. Syst. Paleontol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1