Next Article in Journal
Numerical Scheme Based on the Implicit Runge-Kutta Method and Spectral Method for Calculating Nonlinear Hyperbolic Evolution Equations
Next Article in Special Issue
Learning and Applying Cooperative Solutions: A Classroom Experiment on Transportation Games
Previous Article in Journal
(ζ−m, ζm)-Type Algebraic Minimal Surfaces in Three-Dimensional Euclidean Space
Previous Article in Special Issue
Effective Decision Making: Data Envelopment Analysis for Efficiency Evaluation in the Cloud Computing Marketplaces
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Layered Blockchain Governance Game

by
Song-Kyoo (Amang) Kim
School of Applied Sciences, Macao Polytechnic Institute, R. de Luis Gonzaga Gomes, Macao
Axioms 2022, 11(1), 27; https://doi.org/10.3390/axioms11010027
Submission received: 11 November 2021 / Revised: 30 December 2021 / Accepted: 6 January 2022 / Published: 9 January 2022
(This article belongs to the Special Issue Strategic Decision Models and Applications)

Abstract

:
The research designs a new integrated system for the security enhancement of a decentralized network by preventing damages from attackers, particularly for the 51 percent attack. The concept of multiple layered design based on Blockchain Governance Games frameworks could handle multiple number of networks analytically. The Multi-Layered Blockchain Governance Game is an innovative analytical model to find the best strategies for executing a safety operation to protect whole multiple layered network systems from attackers. This research fully analyzes a complex network with the compact mathematical forms and theoretically tractable results for predicting the moment of a safety operation execution are fully obtained. Additionally, simulation results are demonstrated to obtain the optimal values of configuring parameters of a blockchain-based security network. The Matlab codes for the simulations are publicly available to help those whom are constructing an enhanced decentralized security network architecture through this proposed integrated theoretical framework.

1. Introduction

The blockchain is a hashed digital ledger by accomplishing authenticity of all nodes in a typical peer-to-peer decentralized network which could remove various security threats caused by a centralized network [1,2,3]. The basic blockchain data structure could evaluate data transactions in each chain which grows in an append-only permission on the top of latest verified blocks [1,4]. This mechanism is secure because a single node cannot govern more than half of the computational power in the network [5,6,7,8]. Through the distributed consensus of networks nodes, the blockchain network security is enhanced. If an attacker invests more than 50 percent of the computational power (i.e., governs more than half of the total nodes), he could conquer a whole blockchain network. To avoid majority matters, Verifiable Random Functions (VRFs) are adapted into blockchain-based security applications to remove heavy computation power for mining [9,10]. The VRF is capable to select a miner randomly, and each node has the same chance to be a miner [9]. This technique has been adapted for selecting a miner to map inputs to verifiable pseudorandom outputs [10].
Blockchain technologies have been widely adapted into cyber-security matters including the Internet of Things [11,12], the Internet of Vehicles [13,14,15,16,17,18,19] and Edge-Fog computing [20,21,22] because blockchain-based network architectures (i.e., decentralized networks) are secured to avoid practically any attacks which are dedicated on conventional network architectures (i.e., centralized networks). These attacks on centralized networks include DoS (Denial-of-Service), phishing, spoofing and server hacking attacks. Therefore, the securities based on the blockchain protocol level have been widely studied [2,4,23], but these studies are limited because the configuring parameters for security protocols are arbitrarily chosen. Hence, the Blockchain Governance Game (BGG) and the Strategic Alliance for Blockchain Governance Game (SABGG) are alternatively designed to break through the limitations by constructing a new network architecture. On the other hand, game theoretic approaches for improving securities have also been widely applied into various telecommunication networks [24,25], communication protocols [26] and trustworthy data [27,28]. It is even applied into designing blockchain-based services and securities [29]. The stochastic game executes stochastic transitions among the states of the game, and players in a stochastic game could change their strategies based on the past actions and randomness of behaviors of the other players. Several kinds of stochastic games have been adapted to avoid the 51 percent attack, and a stochastic game has been used for analyzing the selection between honest mining and making the decision of the proper time for adding and releasing mined blocks [2]. The BGG and the SABGG are the mixed model of the fluctuation and the mixed strategy game for analyzing a single layered network to provide the decision making moment for taking preliminary security actions before attacks [30,31]. The SABGG is a variant of BGG, which is designed for strategically allying nodes instead of keeping hidden nodes [31]. These BGG frameworks find optimal decision-making parameters and the strategic choices of a defender are either taking a preliminary action (i.e., a safety mode) or doing nothing. Taking a preliminary action for security operations shall not be optimal until the game reaches one step prior to pass the Nash equilibrium [29]. Once corrupted blocks are generated, all models independently predict the number of blocks to be generated and the moment until more than half of the total nodes are corrupted by an attacker. The techniques deliver the results under a composition of the D –operator and its inverse D –operator, which have been introduced in the BGG models [30,31]. In this paper, the extended blockchain governance game framework is newly designed for improving complex decentralized network securities. The Multi-Layered Blockchain Governance Game (MLBGG) is a combined stochastic game model based on the BGG frameworks. The main contributions of this research are the following:
  • Mathematically analyzing a complex network management;
  • An analytical solution that can support optimal values of configuring parameters for network securities;
  • A complicated decentralized network can be securely designed and managed by using this innovative theoretical framework.
The layer 1 is a set of multiple BGG-based networks, and the other layer (i.e., layer 0) is single SABGG-based network (see Figure 1). This multiple layer framework makes the BGG more flexible to applying various hierarchical system architectures, including Edge-Fog computing [20,21], hierarchical network systems [18,22] and IoT-Server networks (see Section 3).
The paper is organized as follows: Stochastic models of MLBGG architecture with some key analytical techniques are introduced in Section 2. This section also explains how the multi-layered model is connected with the BGG for layer 1 and the SABGG for layer 0. The modeled processes of the accumulated corrupted blocks of each node mathematically predict both the time and size of the nodes and which are governed by attackers. In Section 3, the MLBGG framework is applied into a practical IoT (Internet of Things) network architecture. This section shows how the MLBGG could be adapted into an IoT-Server combined network system. This is a typical way to construct a blockchain-based network architecture by adapting the MLBGG. Various simulations for the MLBGG determine configuring parameters in Section 4. Although theoretical approaches without simulated results still helps computer programming, these simulation are practically optimizing configuring parameters of an IoT-Server combined network system.

2. Multi-Layered Blockchain Governance Game

A multi-layered blockchain governance game (MLBGG) combines a set of multiple BGG networks and single SABGG network which are hierarchically connected. Each system in layer 1 is exactly mapped with the BGG, and layer 0 is mapped with the SABGG (see Figure 2).

2.1. Layer 1: BGG Stochastic Modelling

Layer 1 is a set of η + 1 BGG networks, and the l-th BGG network has M l nodes with B 0 ( η ) reserved nodes for executing a safety operation. In layer 1 (i.e., the second layer), each BGG network between an attacker and a defender are described the antagonistic game. Two players (A: an attacker, H: a defender) in the l-th BGG network in layer 1 compete to build the blocks either for honest or false ones. It is noted that one particular BGG network in layer 1 (i.e., l-th network) is firstly analyzed and combining whole BGG networks as a single set will be covered later in this section.
Let ( Ω , F Ω , P ) be probability space F A l , F H l , F τ F Ω and layer 1 be independent σ -subalgebras in the l-th network ( l = 0 , 1 , η ). Let us consider F A l -measurable and F H l -measurable marked Poisson processes as follows:
A l : = k 0 X k l ε s k l , s 0 l = 0 < s 1 l < s 2 l < ,
H l : = j 0 Y j l ε t j l , t 0 l = 0 < t 1 l < t 2 l < ,
where l = 0 , 1 , , η with respective intensities λ A l and λ H l of l-th network in layer 1 and ε a is a point mass at a. These two values are related with block generating performances of an attacker and a defender [30]. In the l-th BGG network in layer 1, the processes A l and H l are specified by their transforms:
E g A l s = e λ A l s g 1 , l = { 0 , 1 , , η } ,
E z H l t = e λ H l t z 1 , l = { 0 , 1 , , η } ,
where η is the total number of allied nodes in layer 0, and the observation process for all systems in layer 1 is:
T : = i 0 ε τ i , τ 0 > 0 , τ 1 , ,
which is assumed to be delayed renewal process. If
A l t , H l t : = A l H l 0 , τ k l , k = 0 , 1 , ,
forms an observation process upon A l H l embedded over T , with respective increments
X k l , Y k l : = A l H l τ k 1 , τ k , k = 1 , 2 , ,
and
X 0 l = A 0 l , Y 0 l = H 0 l , l = { 0 , 1 , , η } .
The observation process of the l-th BGG network could be formalized as
A τ l H τ l : = k 0 X k l , Y k l ε τ k , l = { 0 , η } ,
with position-dependent marking in the l-th blockchain network and with X k l and Y k l could be defined with the notation
Δ k : = τ k τ k 1 , k = 0 , 1 , , τ 1 = 0 ,
and
γ l g , z = E g X k l · z Y k l , g 1 , z 1 .
Due to the double expectation,
γ l g , z = δ λ a l 1 g + λ h l 1 z , l = { 0 , 1 , , η } ,
and
γ 0 l g , z = δ 0 λ a l 1 g + λ h l 1 z ,
where
δ θ = E e θ Δ 1 , δ 0 θ = E e θ τ 0
are the marginal transform of increments Δ 1 , Δ 2 , . In the l-th system, the stochastic process A τ l H τ l analyzes a conflict between players with an observation process for the l-th system in the layer 1. This game is over when the collateral building blocks by either one of player exceeds the threshold (> M l 2 ) on the k-th observation epoch τ k . The exit indices for each network are:
ν l : = i n f k : A k l = A 0 l + X 1 l + + X k l M l 2 ,
μ l : = i n f j : H j l = H 0 l + Y 1 l + + Y j l M l 2 ,
where l = { 0 , 1 , , η } , and η is the number of backup nodes, which are equivalent with the number of nodes in layer 0. Player A (an attacker) wins at time τ ν l ; otherwise, player H (a defender) generates the correct blocks. At this moment, the confined game in the view point of player A l for each BGG network in layer 1 is targeted. The Formula (6) will be modified as:
A τ l ¯ H τ l ¯ : = k 0 ν l X k l , Y k l ε τ k
which is the path of the game from F Ω ν l < μ l , which gives an exact definition of the model observed until τ ν l . The joint functional of the l-th BGG model in layer 1 is as follows:
Φ M l 2 l = Φ M l 2 l ξ , g 0 , g 1 , z 0 , z 1 = E ξ ν l · g 0 A ν l 1 l · g 1 A ν l l · z 0 H ν l 1 l · z 1 H ν l l 1 ν l < μ l , l = { 0 , , η } .
This functional represents the status of an attacker and honest nodes upon the exit time τ ν l , l = { 0 , 1 , , η } . For the BGG-1 theorem [30], the operators for the first exceed model [32,33] are defined as follows:
D x , y f x , y u , v : = 1 u 1 v x 0 y 0 f x , y u x v y , | | u | | < 1 , | | v | | < 1 ,
where f x , y is a sequence, with the inverse:
D u , v m , n = 1 m ! · n ! lim u , v 0 m n u m v n 1 1 u 1 v , m 0 , n 0 .
Additionally, the new operators for dealing with the matrix calculations are introduced. Let us consider the matrix of a function set f x , y as follows:
f x , y = f 0 x , y f 1 x , y f n x , y
and the matrix operations for D x , y and D u , v m , n are defined as follows:
D f x , y : = D x , y f = 1 u 1 v f 0 x , y u x v y 1 u 1 v f 1 x , y u x v y 1 u 1 v f l x , y u x v y 1 u 1 v f n x , y u x v y
and
D M r 1 G u , v : = D u , v m 0 , n 0 G 0 u , v D u , v m 1 , n 0 G 1 u , v D u , v m l , n l G l u , v D u , v m n , n n G r u , v ,
where
M r = m 0 n 0 m 1 n 1 m r n r
From the BGG-1 Theorem [30], we can set up the matrix of the functional and the functional matrix for all blockchain networks in layer 1 as follows:
Φ M η 1 = D M η 1 G u , v ,
where
G u , v = G 0 u , v G l u , v G η u , v , M η = M 0 2 M 0 2 M l 2 M l 2 M η 2 M η 2 ,
and M η indicates the vector form of all blockchain networks in layer 1. From (18):
Φ M l 2 l = D u , v M l 2 , M l 2 G l u , v , l = { 0 , , η } ,
where
G l u , v = Γ 0 1 Γ 0 + ξ · γ 0 1 ξ γ Γ 1 Γ ,
and
γ : = γ l g 0 g 1 u , z 0 z 1 v ,
γ 0 : = γ 0 l g 0 g 1 u , z 0 z 1 v ,
Γ : = γ l g 1 u , z 1 v ,
Γ 0 : = γ 0 l g 1 u , z 1 v ,
Γ 1 : = γ l g 1 , z 1 v ,
Γ 0 1 : = γ 0 l g 1 , z 1 v .
From (18) and (27), the probability generating functions (PGFs) for A ν l 1 l (and also A ν l l ) and the exit index ν l of the l-th BGG network in the layer 1 are determined as follows:
E ξ ν l = Φ M l 2 l ξ , 1 , 1 , 1 , 1 ,
E g 0 A ν l 1 l = Φ M l 2 l 1 , g 0 , 1 , 1 , 1 ,
E g 1 A ν l l = Φ M l 2 l 1 , 1 , g 1 , 1 , 1 , l = { 0 , , η } .
From (5), (10) and (34), the moments of making a decision τ ν 1 are:
E ν l = ξ Φ M 2 l ξ , 1 , 1 , 1 , 1 | ξ = 1 ,
E τ ν l 1 = E τ 0 + E Δ 1 E ν l 1 , l = { 1 , , η } .
In a conventional BGG [30], the probability of bursting the l-th blockchain network q l s H is determined as follows:
q l s H = E 1 A ν l M 2 , s H = DoNothing , E 1 A ν l M 2 + B 1 , s H = Action
where B 1 ( η ) is the number of backup nodes, which are hooked as in layer 0 (see Figure 2), and the reserved nodes depend on the availability of other blockchain networks in the same layer. When the reserved nodes are realized during a safety mode, the bursting probability of the l-th blockchain network in the layer 1 is revised as follows:
E 1 A ν l M l 2 + B 1 = E E 1 A ν M l 2 + B 1 | B 1
where
P B η 1 = j = η j ρ 1 j 1 ρ 1 η j ,
ρ 1 = 1 η + 1 E k = 0 η 1 H ν k M k 2 .

2.2. Layer 0: SABGG Stochastic Modelling

The SABGG network with η + 1 nodes are considered in the layer 0 (i.e., the first layer) and two persons (called “Corrupted” and “Genuine”) play a game by governing blocks which are either genuine or corrupted ledgers. For layer 0, let us assume:
C : = j 0 J j ε u j , u 0 = 0 < u 1 < u 2 < ,
G : = k 0 K k ε v k , v 0 = 0 < v 1 < v 2 < ,
are also marked Poisson processes (i.e., F c and F g measures) and position-independent marking with respective intensities λ c and λ g . Similar to (5), a third-party observation point process is determined as follows:
U : = i 0 ε t i , t 0 > 0 ) , t 1 , .
Similarly, player C (corrupted; a layer 0 attacker) builds the blocks which contain false transactions at the times u 1 , u 2 , . In the other hand, player G (genuine; a layer 0 defender) generates the blocks which contain the correct transactions. The transforms of the processes C and G are:
E y C u = e λ c u y 1 , E z G v = e λ g v z 1 .
Unlike layer 1, layer 0 has one single SABGG network. The observation process upon C G with respective increments:
J i , K i : = C G t i 1 , t i , i = 1 , 2 , ,
and
J 0 = C 0 , K 0 = G 0 .
The observation process of layer 0 is formalized as:
C t G t : = i 0 J i , K i ε t i ,
where
C t = i 0 J i ε t i , G t = i 0 K i ε t i ,
with position-dependent marking. We can find the functional
α y , z = E y J i · z K i , y 1 , z 1
with the notation
U i : = t i t i 1 , i = { 0 , 1 , } , t 1 = 0 .
Similarly, from the previous section, we have:
α y , z = α λ c 1 y + λ g 1 z ,
α 0 y , z = α 0 λ c 1 y + λ g 1 z ,
where
α θ = E e θ U 1 , α 0 θ = E e θ t 0 .
The exit indices are formalized as follows:
ν : = i n f j : C j ( = C 0 + J 1 + + J j ) η 2 ,
ν 2 : = i n f j : C j ( = C 0 + J 1 + + J j ) B 0 η 2 ,
μ : = i n f l : G l ( = G 0 + K 1 + + K l ) η 2 ,
where B 0 ( η ) is the number of available nodes by the strategic alliance. The game in the layer 0 is over at min ν , ν 2 , μ . The first passage time t ν is the associated exit time from the confined game, and Formula (49) is modified as:
C t ¯ G t ¯ : = n 0 ν J n , K n ε t n ,
which gives an exact definition of the model observed until t ν without the strategic alliance action. The explicit formula of the SABGG [31] is as follows:
Θ η 2 = Θ ν , ν 2 , μ ζ , y 0 , y 1 , b , z 0 , z 1 = E ζ ν · y 0 C ν 1 · y 1 C ν · b C ν B η · z 0 G μ 1 · z 1 G μ 1 ν < ν 2 < μ ,
and the extended first exceed theory [32,33] has been applied, and the operator D a , b , c q , r , s is defined as:
D a , b , c q , r , s g a , b , c : = 1 q 1 r 1 s · a 0 b 0 c 0 g a , b , c q a r b s c ,
and | | q | | < 1 , | | r | | < 1 , | | s | | < 1 . Then, we have:
g a , b , c = D q , r , s a , b , c D a , b , c g a , b , c q , r , s ,
where g a , b , c is a sequence, with the inverse:
D q , r , s a , b , c = 1 a ! · b ! · c ! lim q , r , s 0 a b c q a r b s c 1 1 q 1 r 1 s .
From the BGG-2 Theorem [31]:
Θ N 2 = D q , r , s η 2 , η 2 , η 2 σ η · β 1 β 1 1 β · α 0 1 α 0 + ζ Φ 0 1 ζ Φ α 1 α ,
where
Φ : = α y 0 y 1 b q r , z 0 z 1 s ,
Φ 0 : = α 0 y 0 y 1 b q r , z 0 z 1 s ,
α : = α y 1 b q , z 1 ,
α 0 : = α 0 y 1 b q , z 1 ,
α 1 : = α y 1 b , z 1 ,
α 0 1 : = α 0 y 1 b , z 1 ,
β : = α b r , s ,
β 1 : = α r , 1 ,
σ η : = E b B η .
The moment of making a decision t ν 1 could be found as follows:
E ν = ζ Θ η 2 ζ , 1 , 1 , 1 , 1 , 1 | ζ = 1 ,
E t ν 1 = E t 0 + E U 1 E ν 1 .
In layer 0, the probability of bursting the blockchain network q 0 s H is determined as follows:
q 0 s g = E 1 C ν η 2 , s g = DoNothing , E 1 C ν η 1 + α 2 , s g = Action .
where α is an overhead portion for protecting the layer 0 (i.e., B 0 = η 2 · α ). The probability of bursting a SABGG network by an attacker is as follows:
q s g = k > η 2 E 1 C ν = k , s g = DoNothing , E k > η 2 + B 0 E 1 C ν = k , s g = Action ,
where
E 1 C ν = k = E E λ c t ν k k ! · e λ c t ν | t ν .

3. Multiple Layered IoT-Server Network Design

The MLBGG framework is suitable to adapt any type of hierarchical networks, including computer networks and management systems. A typical IoT-Server network architecture is connected cars (i.e., IoT connection) which are controlled by agent servers which are decentralized and equally contributed. The Internet of Vehicles or EBIoV (Enhanced Blockchain-based Internet of Vehicles) [19] are widely known frameworks for connecting smart components in each car. Although the application in this paper deals with smart components in a connected car as IoT elements, this model could be applied to drones as IoT elements for improving their security. Basically, any IoT component could consider the MLBGG model for enhancing its security without centralized authentication systems.

3.1. Multiple Layered IoT-Server Network Architecture

The networks which combines IoT networks and a server network could adapt the MLBGG. The set of IoT networks is one layer and one set with management servers is the other layer. The BGG is adapted into IoT networks as layer 1 and the SABGG is applied into the network of management servers (see Figure 3).
Layer 1 contains η + 1 IoT systems, and each IoT system has M l , l = { 0 , 1 , , η } components which are fully connected. The l-th IoT system should have at least one (agent) server as a component within M l components. These servers, which have higher control levels, become the components in layer 0, and the η + 1 elements in layer 0 are the backup nodes for all IoT systems in layer 0 (i.e., shared backup nodes). Since η + 1 servers in layer 0 can keep multiple ledgers, each server has all ledgers from the IoT systems in layer 0. It is noted that up to η nodes might allay one node in layer 0. The blockchain ledger for the agent system (i.e., layer 0) is different than the ledgers for IoT systems (i.e., layer 1) and is only shared within layer 0.

3.2. Stochastic Optimization

In layer 1, the reserving costs for backup nodes (i.e., “Action” strategy of a defender in layer 1) should be cheaper than the network bursting costs; otherwise, player H would choose the other strategy (“DoNothing” strategy). The number of nodes for protecting η + 1 BGG networks in layer 1 depends on the cost function. Available reserved nodes are equally applied to every BGG networks in layer 1, and the optimal portion for the blockchain governance B 1 could be found as follows:
B 1 = inf η 0 : C 1 B 1 , B 1 η ,
where
C 1 B 1 = l = 0 η E C 1 l B η 1 Total .
The governance cost function for governance for the l-th BGG networks in the layer 1 is as follows:
C 1 l B Total = C Act l B · E 1 A ν 1 l < M l 2 + C NoA l · E 1 A ν 1 l M l 2
and
ρ 1 = 1 η + 1 E l = 0 η 1 H ν l M l 2 , l = { 0 . , η } .
For each blockchain network in layer 1, no action for the l-th blockchain network will be taken until the moment τ ν l 1 . If the attacker catches less than half of all nodes at τ ν 1 l (i.e., A ν 1 l < M l 2 ), then the defender could take the action to avoid the attack at τ ν l , l = 0 , 1 , , η .
In layer 0, the acceptance rate of a strategic alliance in a blockchain network α depends on the cost function and the optimal portion α 0 for the SABGG could be found as follows (where B : = B η 0 = η 2 · α ):
α 0 = inf α 0 : C NoA 0 r 0 C Act 0 α ,
where (at the moment t ν 1 )
C NoA 0 r 0 = U 0 · r 0 ,
C Act 0 α , η = c η 0 α 1 r α 1 + c η 0 α + U 0 r α 1 ,
r 0 = E 1 C ν η 2 , r α 1 = E 1 C ν η 2 + B .
From (82) and (83), the optimal acceptance rate for layer 0 is determined as follows:
α * = min ρ 1 , α 0 ,
and the defender will not take any action until the time t ν 1 for layer 0. If the attacker catches less than half of all nodes at t ν 1 (i.e., C ν 1 < η 2 ), then the defender could take the action to avoid the attack at t ν . The total cost for developing the enhanced blockchain network is as follows:
C 0 α , η Total = C Act 0 B · E 1 C ν 1 < η 2 + C NoA 0 · E 1 C ν 1 B ,
and the optimal portion for the blockchain governance η 0 could be found as follows:
η 0 = inf η 0 : C 0 η .
Since Θ η 2 1 , y 0 , 1 , 1 , 1 , 1 from (2.64) is the probability generating function of C ν 1 , the probability mass could be found as follows:
P C ν 1 = k = lim y 0 0 1 k ! k y 0 k Θ N 2 1 , y 0 , 1 , 1 , 1 , 1 , k = 0 , , η 2 .
From (79) and (89), the optimal number of the reserved nodes for layer 0 in layer 1 could be found as follows:
η * = max B 1 , η 0 .
Based on the conditions, the LP (Linear Programming) model could be described as follows:
Objective:
m i n G = E C 0 B 0 Total + C 1 B 1 Total
Subject to:
α * c η U 0 · r 0 c η .

4. Model Simulations

The safety mode is considered for protecting a network. Theoretically, the BGG-based network takes a preliminary action to avoid a 51 percent attack by an attacker. The simulations in this section are targeted to find optimal values of the configuring parameters, including an optimal number of reserved nodes in the layer 1 and the acceptance rate for the SABGG-based network in layer 0. The first simulation is finding the optimal value of reserved nodes for IoT networks in layer 1 (Section 4.2). The second one is designed to evaluate the optimal acceptance rate of the SABGG which is adapted in layer 0 (Section 4.3). Lastly, an overall cost comparison with a conventional network without adapting the BGG is discussed on Section 4.4.

4.1. Preliminaries

The safety mode is considered for protecting a multi-layered network. Theoretically, a BGG based network takes a preliminary action to avoid a 51 percent attack by an attacker. The action may actually happen before governing more than half of the nodes by an attacker or after. Two points of the Proof-Of-Work (POW) are considered as action points: One is the moment that passes more than a half of the nodes in the networks which are more than M l 2 , l = 0 , 1 , η for layer 1 and more than η 2 for the layer 0. The other is one step prior to passing more than half the nodes in both layers. The best situation shall be that the safety mode is executed when an attacker takes more than half of the nodes, but the network is protected by releasing additional backup nodes. However, it is noted that attempting to govern more than a half of the nodes may happen even after exiting the safety mode (see Figure 4).
The simulation is processed by the following strategies:
  • Two cases (one is with the BGG, the other is without the BGG) per each layer are simulated;
  • Simulating the 51 percent attack to evaluate whether the nodes in the network are protected by the BGG or not;
  • If the number of nodes governed by the attack is more than half at τ ν l (i.e., A ν l M l 2 , l = { 0 , 1 , , η } ), the networks in layer 1 are burst;
  • If the number of nodes governed by the attack is more than half at t ν (i.e., C ν η 2 ), the network of layer 0 is burst;
  • The safety modes for each layer are randomly executed based on the Binomial random variables;
  • The observation (i.e., the duration of the proof-of-work) are the same within the same layer.
The strategy for protecting each network in layer 1 is for supporting the additional nodes to give the less chance that an attacker catches blocks with false control requests. The IoT-connected network is considered as a BGG network in the layer, and the estimated mean value of each network in layer 1 is around USD 10,000 each. The reserved nodes for a safety mode are the same for main nodes in the layer 0. All nodes in the layer 0 contains multiple ledgers of all network in the layer 1 (i.e., the number of reserved nodes η for a safety mode is same for all network in the layer 1). The details of other setups are described in Table 1.
The setups for layer 0 could be similarly described in Table 2. It is noted that the overall loss value by the burst layer 0 network is higher than the average loss values of networks in layer 1 because the components in layer 1 are mainly IoT sensors, which are cheaper than the components in layer 0, which are typically servers and workstations.

4.2. Optimizing Backup Nodes for the Layer 1

This simulation considers that 41 (i.e., η + 1 ) IoT networks (as layer 1) are hooked up as a single network (as layer 0), and each IoT network has up to 40 backup nodes for security modes. The simulation goes for 1000 trials and finds the optimal number of backup nodes based on the cost efficiency. It has been executed 4 times with 1000 trials, and the optimal values vary (see Figure 5).
It shows that the optimal number of backup nodes are ranged between 35 and 45 nodes. The cost efficiency is around 46 percent, which indicates 250 BGG-based IoT networks are 46 percents cheaper than conventional IoT networks in terms of overall operating costs.

4.3. Acceptance Rate of Strategic Alliance in the Layer 0

In layer 0, the acceptance rate is a vital matter because the layer 0 network adapts the SABGG [31]. This simulation robustly finds the optimal acceptance rate with correspond to number of nodes in layer 0. The simulation shows that around a 46 percent acceptance rate will give the best effort regardless of the number of nodes in layer 0 (see Figure 6).

4.4. Overall Performance Discussion of a Multi-Layered BGG

This session shows the comparison between a Multi-Layered BGG (MLBGG) and a blockchain network without BGG. The simulation calculates the average operating costs of both networks (layer 0 and 1) based on 1000 trials with the given conditions (Table 1 and Table 2). The result shows that the average operating costs for the safety mode are USD 286,916 for the MLBGG adapted network (USD 115,400 in layer 0 and USD 171,516 in layer 1) and the network without the MLBGG costs USD 520,000 (i.e., USD 120,000 + USD 400,000).
The average cost efficiency of the MLBGG-adapted network ε that compares to the safety operation cost of conventional IoT networks can be solved as follows [34]:
ε = | C b C r | C r
where C b (=USD 286,916) is the average safety operation costs with the MLBGG and C r (=USD 520,000) is the cost of an atypical IoT network without the BGG adaptation. From (94), the MLBGG cost efficiency is 0.4482 (in Figure 7), which means that about 45 percent of the costs are saved by adapting an MLBGG. Since the testing values are randomly generated in each simulation, the results from other trials might not be the same as the current ones in this section.

5. Conclusions

The major target of this paper has established explicit formulas of the Multi-Layered Blockchain Governance Game, and the set of IoT networks are combined with secure management network systems as a higher hierarchy. This hybrid network architecture directly adapts the blockchain governance game for enhancing the security. An analytic approach supports the theoretical background of decision-making factors to design the enhanced network architecture. The several simulations are executed to find various hyper-parameters, which also impacts the network performance. This innovative architecture is targeted to improve the security only based on network architectural perspectives. This new proposed model is still theoretical, and actual implementations on real blockchain networks shall be developed to see how this theory is actually working. Other technical perspectives for improving blockchain security are out of scope in this paper, but combining these technical perspectives and the MLBGG might be considered as future research topics. The MLBGG model shall be extended to various blockchain-based cybersecurity network frameworks for connected cars and smart drone swarms.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Special thanks to the Guest Editor, Ana Meca, who has guided the author to submit the proper topic of the journal. The Matlab codes for the simulations are publicly available on GitHub (https://github.com/amangkim/mlbgg (accessed on 10 November 2021)) for users to try the demonstrations of the Multi-Layered Blockchain Governance Game.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2009. Available online: http://www.bitcoin.org (accessed on 10 November 2021).
  2. Beikverdi, A.; Song, J. Trend of centralization in Bitcoin’s distributed network. In Proceedings of the 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Takamatsu, Japan, 1–3 June 2015; pp. 1–6. [Google Scholar]
  3. Yli-Huumo, I.; Ko, D.; Choi, S.; Park, S.; Smolander, K. Where Is Current Research on Blockchain Technology? A Systematic Review. PLoS ONE 2016, 11, e0163477. [Google Scholar] [CrossRef] [PubMed]
  4. Decker, C.; Wattenhofer, R. Information propagation in the Bitcoin network. In Proceedings of the IEEE P2P 2013 Proceedings, Trento, Italy, 9–11 September 2013; pp. 1–10. [Google Scholar]
  5. Kim, W. Bitcoin, Blockchain Mechanism and Its Evolution. 2018. Available online: http://www.itfind.or.kr/publication/ (accessed on 10 November 2021). (In Korean).
  6. Narayanan, A.; Clar, J. Bitcoin’s Academic Pedigree. Mag. Commun. ACM 2017, 60, 36–45. [Google Scholar] [CrossRef]
  7. Weiss, M.; Corsi, E. Bitfury: Blockchain for Government. HBP Case 2018, 12, 818-031. [Google Scholar]
  8. Armknecht, F.; Karame, G.O.; Mandal, A.; Youssef, F.; Zenner, E. Ripple: Overview and Outlook. In Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2015; Volume 9229, pp. 163–180. [Google Scholar]
  9. Micali, S.; Rabin, M.O.; Vadhan, S.P. Verifiable random functions. In Proceedings of the 40th IEEE Symposium on Foundations of Computer Science, New York, NY, USA, 17–18 October 1999; pp. 120–130. [Google Scholar]
  10. Goldberg, S.; Reyzin, L.; Papadopoulos, D.; Vcelak, J. Verifiable Random Functions. IETF. 2021. Available online: https://datatracker.ietf.org/doc/draft-irtf-cfrg-vrf/09/ (accessed on 10 November 2021).
  11. Restuccia, F.; D’Oro, S.; Kanhere, S.S.; Melodia, T.; Das, S.K. Blockchain for the Internet of Things: Present and Future. 2018. Available online: https://arxiv.org/abs/1903.07448 (accessed on 1 May 2019).
  12. Bolton, T.; Dargahi, T.; Belguith, S.; Al-Rakhami, M.S.; Sodhro, A.H. On the Security and Privacy Challenges of Virtual Assistants. Sensors 2021, 21, 2312. [Google Scholar] [CrossRef] [PubMed]
  13. Rouse, M. Internet of Vehicles. 2018. Available online: https://whatis.techtarget.com/definition/Internet-of-Vehicles (accessed on 1 May 2019).
  14. Dandala, T.T.; Krishnamurthy, V.; Alwan, R. Internet of Vehicles (IoV) for traffic management. In Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India, 10–11 January 2017; pp. 1–4. [Google Scholar]
  15. Conoscenti, M.; Vetro, A.; De Martin, J.C. Blockchain for the Internet of Things: A systematic literature review. In Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications (AICCSA 2016), Agadir, Morocco, 29 November–2 December 2016. [Google Scholar]
  16. Haig, S. Ford to Use Cryptocurrency for Inter-Vehicle Communication System. 2017. Available online: https://news.bitcoin.com/ford-cryptocurrency-inter-vehicle-communication-system/ (accessed on 1 May 2019).
  17. Hamid, U.Z.A.; Zamzuri, H.; Limbu, D.K. Internet of Vehicle (IoV) Applications in Expediting the Implementation of Smart Highway of Autonomous Vehicle: A Survey. In Performability in Internet of Things; Springer: Cham, Switzerland, 2018; pp. 137–157. [Google Scholar]
  18. Dorri, A.; Steger, M.; Kanhere, S.S.; Jurdak, R. BlockChain: A Distributed Solution to Automotive Security and Privacy. IEEE Commun. Mag. 2017, 55, 119–125. [Google Scholar] [CrossRef] [Green Version]
  19. Kim, S.-K. Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics 2021, 9, 109. [Google Scholar] [CrossRef]
  20. Baker, J. Edge Computing—The New Frontier of the Web. 2017. Available online: https://hackernoon.com/edge-computing-a-beginners-guide-8976b6886481 (accessed on 10 November 2021).
  21. ERPINNEW. Fog Computing vs. Edge Computing. 2017. Available online: https://erpinnews.com/fog-computing-vs-edge-computing (accessed on 1 May 2019).
  22. Cisco Networking Academy. Connecting Networks Companion Guide; Cisco Press: Indianapolis, IN, USA, 2014. [Google Scholar]
  23. Eyal, I.; Sirer, E. Majority Is Not Enough: Bitcoin Mining Is Vulnerable. In Lecture Notes in Computer Science; Springer: Berlin, Germany, 2014; Volume 8437, pp. 436–454. [Google Scholar]
  24. Abdalzaher, M.S.; Seddik, K.; Elsabrouty, M.; Muta, O.; Furukawa, H.; Abdel-Rahman, A. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey. Sensors 2016, 16, 1003. [Google Scholar] [CrossRef] [Green Version]
  25. Hu, J.; Reed, M.; Thomos, N.; AI-Naday, M.F.; Yang, K. Securing SDN-Controlled IoT Networks Through Edge Blockchain. IEEE Internet Things 2021, 8, 2102–2115. [Google Scholar] [CrossRef]
  26. Wang, T.; Bai, X.; Wang, H.; Liew, S.C.; Zhang, S. Game-Theoretical Analysis of Mining Strategy for Bitcoin-NG Blockchain Protocol. IEEE Syst. 2021, 15, 2708–2719. [Google Scholar] [CrossRef]
  27. Abdalzaher, M.S.; Muta, O. A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications. IEEE Internet Things 2020, 7, 11250–11261. [Google Scholar] [CrossRef]
  28. Abdalzaher, M.S.; Seddik, K.; Muta, O. An effective Stackelberg game for high-assurance of data trustworthiness in WSNs. In Proceedings of the 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 3–6 July 2017; pp. 1257–1262. [Google Scholar]
  29. Liu, Z.; Luong, N.C.; Wang, W.; Niyato, D.; Wang, P.; Liang, Y.C.; Kim, D.I. A Survey on Applications of Game Theory in Blockchain. arXiv 2019, arXiv:1902.10865. [Google Scholar]
  30. Kim, S.-K. Blockchain Governance Game. Comput. Ind. Eng. 2019, 136, 373–380. [Google Scholar] [CrossRef] [Green Version]
  31. Kim, S.-K. Strategic Alliance for Blockchain Governance Game. Probab. Eng. Inf. Sci. 2021, 1–17. [Google Scholar] [CrossRef]
  32. Dshalalow, J.H.; Ke, H.-J. Layers of noncooperative games. Nonlinear Anal. 2009, 71, 283–291. [Google Scholar] [CrossRef]
  33. Dshalalow, J.H. First Excess Level Process, Advances in Queueing; CRC Press: Boca Raton, FL, USA, 1995; pp. 244–261. [Google Scholar]
  34. Kim, S.-K. Design of stochastic hitless-prediction router by using the first exceed level theory. Math. Methods Appl. Sci. 2003, 28, 1481–1490. [Google Scholar] [CrossRef]
Figure 1. Multi-Layered Blockchain Governance Game structure.
Figure 1. Multi-Layered Blockchain Governance Game structure.
Axioms 11 00027 g001
Figure 2. BGG and SABGG mapping into MLBGG.
Figure 2. BGG and SABGG mapping into MLBGG.
Axioms 11 00027 g002
Figure 3. IoT-Server network architecture in the MLBGG. Mk (k = 0, 1, 2, … N) is the index which is started from 0 and N + 1 is the total count of cars.
Figure 3. IoT-Server network architecture in the MLBGG. Mk (k = 0, 1, 2, … N) is the index which is started from 0 and N + 1 is the total count of cars.
Axioms 11 00027 g003
Figure 4. Operation of the safety mode of layer 0 (top) and layer 1 (bottom).
Figure 4. Operation of the safety mode of layer 0 (top) and layer 1 (bottom).
Axioms 11 00027 g004
Figure 5. Simulation results to find the optimal value of the backup node.
Figure 5. Simulation results to find the optimal value of the backup node.
Axioms 11 00027 g005
Figure 6. Acceptance rate optimization in layer 0.
Figure 6. Acceptance rate optimization in layer 0.
Axioms 11 00027 g006
Figure 7. Performance comparison graph.
Figure 7. Performance comparison graph.
Axioms 11 00027 g007
Table 1. Initial conditions for layer 1.
Table 1. Initial conditions for layer 1.
NameValueDescription
E M l 250Average number of nodes of each network in layer 1 ( l = { 1 , , N } )
E V l 10,000 [USD]Average value of each network in layer 1
c 1 B The cost for reserving nodes to avoid attacks in layer 1
λ A l The rate of attacking in layer 1
BThe number of backup nodes supported from layer 0 ( B η )
Table 2. Initial conditions for layer 0.
Table 2. Initial conditions for layer 0.
NameValueDescription
α (or p)Acceptance rate for strategic alliance in layer 0
U 0 120,000 [USD]Total value of the layer 0 network
c 0 α The cost for reserving nodes to avoid attacks in layer 0
λ c The rate of governing nodes by attackers in layer 0
N41 [Nodes]Total number of nodes in layer 0 ( N = η + 1 )
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kim, S.-K. Multi-Layered Blockchain Governance Game. Axioms 2022, 11, 27. https://doi.org/10.3390/axioms11010027

AMA Style

Kim S-K. Multi-Layered Blockchain Governance Game. Axioms. 2022; 11(1):27. https://doi.org/10.3390/axioms11010027

Chicago/Turabian Style

Kim, Song-Kyoo (Amang). 2022. "Multi-Layered Blockchain Governance Game" Axioms 11, no. 1: 27. https://doi.org/10.3390/axioms11010027

APA Style

Kim, S. -K. (2022). Multi-Layered Blockchain Governance Game. Axioms, 11(1), 27. https://doi.org/10.3390/axioms11010027

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop