Next Article in Journal
Hierarchical Control Strategy with Battery Dynamic Consideration for a Dual Fuel Cell/Battery Tramway
Next Article in Special Issue
Dynamic Output Feedback Quantization Control of a Networked Control System with Dual-Channel Data Packet Loss
Previous Article in Journal
Neural Network Trajectory Tracking Control on Electromagnetic Suspension Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Various Blockchain Governance Games: A Review

by
Song-Kyoo (Amang) Kim
Faculty of Applied Sciences, Macao Polytechnic University, R. de Luis Gonzaga Gomes, Macao, China
Mathematics 2023, 11(10), 2273; https://doi.org/10.3390/math11102273
Submission received: 19 April 2023 / Revised: 8 May 2023 / Accepted: 9 May 2023 / Published: 12 May 2023
(This article belongs to the Special Issue Advanced Stochastic Modelling and Applications)

Abstract

:
Blockchain Governance Game (BGG) is the stochastic model for describing the innovative security enhancement of decentralized network architectures. This hybrid model provides the best strategies to prepare for preventing network failures by attackers. Strategic alliance for the Blockchain Governance Game, a successor to BGG, adds the strategic alliance to prevent attacks by adapting the concept from business domains. The multi-layered Blockchain Governance Game was developed by combining these two basic models to defend complex networks. This paper not only provides a brief summary of each game model, but also identifies two key network security applications based on BGGs that could serve as a guide for actual implementation. This review is intended to encourage people to be inspired for their future research. The author hopes to encourage readers working in related research areas who might integrate BGG models into their research.

1. Introduction

The blockchain is a distributed public digital ledger that is maintained by consensus among a network of peer-to-peer nodes and blockchain networks, which has been widely used in a wide range of services and applications other than cryptocurrencies [1,2,3]. A conventional decentralized network has benefits that eliminate most of the security risks from centralized networks. The basic blockchain data structure is designed to store genuine transacted information in a logical chain which grows in an add-only fashion with all new confirmed blocks [4,5]. The federated consensus of miners ensures a blockchain security and this consensus is only reliable if no miner owns more than 50 percent of the computing power in the network and more than half of the nodes are not controlled by a single entity [6,7,8,9]. If this assumption is violated, the distributed consensus is rendered invalid [1,4,5]. As a result, decentralized networks (i.e., blockchain networks) require a certain level of security to defend against attackers. Verifying transactions, distributing blocks, and adding blocks to the blockchain are all part of blockchain security. Although blockchain records are not immutable, they are considered a secure network [10,11]. Some researchers have improved the protocol security levels, whilst other studies have proposed a new protocol to prevent the 51 percent attack [2,5]. Although these conventional protocol enhancements aim to prevent the 51 percent attack, their implementations are limited because the critical values and boundaries of solutions are arbitrarily chosen [12,13]. Hence, three theoretical models of Blockchain Governance Games (BGGs) have been developed by Kim [14,15,16].
  • Blockchain Governance Game (BGG) [14] is a theoretical model that provides a stochastic game framework for determining the best strategies to prevent network failures. The combination of a mixed strategy game and fluctuation theories yields analytically tractable results for enhancing decentralized network securities.
  • Strategic Alliance for Blockchain Governance Game (SABGG) provides an alternative method for reserving real nodes [15]. A novel secure blockchain network framework has been suggested for preventing damages. From a strategic management standpoint, the alliance concept is applied on top of a general BGG. This hybrid mathematical model aims to determine the strategies for protecting a network via strategic alliances with other nodes. This model is a combination of a strategic management framework on top of a conventional BGG.
  • Multi-Layered Blockchain Governance Game (MLBGG) [16] is a complex model which is an analytical stochastic model for performing a security operation in order to protect entire multi-layered networks from attackers. This study thoroughly analyzes the set of networks using explicit mathematical forms for predicting when a security operation should be performed.
The BGG and its variants are widely referenced for related studies on blockchain securities [17,18,19,20,21] and game theory applications [22]. Although game theories are very classical mathematical modeling techniques, game theories have been widely applied, even for conventional artificial intelligence decision-making systems [23,24]. Additionally, various applications are have been developed by adapting BGGs since the first model was invented in the last couple of years [25,26]. Architectural approaches such as BGG, SABGG, and MLBGG could be used as a defense mechanism on the securities of machine learning training [27]. Data poisoning (DP) attacks are designed to undermine the integrity of a target model by modifying the required dataset used by the model during the training phase [28]. A thorough examination of the most recent advances in defense schemes against poisoning attacks is expected to serve as a guideline for developing a novel approach that achieves a certain level of immunization against DP on smart devices feeding data to smart city systems [29]. Although data poisoning defense mechanisms in the testing phase are very rare [27], a trusted execution environment (TEE) has been alternatively suggested for a secure execution environment to protect that which is targets confidentiality and integrity [30,31]. The mechanisms for constructing secured environments are broader than just AI-dedicated ones [32,33,34,35,36,37]. BGG-based defense mechanisms could be an alternative to TEEs by ensuring the integrity within connected nodes [14,15,16]. Any security mechanisms that improve integrity and confidentiality could be regarded as AI training system TEEs. The main contribution is that this paper offers a comprehensive review of BGGs and their flagship applications, which have been actively studied recently. This review paper is targeted to encourage other researchers to develop new applications based on BGG models. The BGGs are the first analytical and mathematically proven stochastic models for the blockchain-based network architecture that combine the game and fluctuation theory. The analytical functionals of the BGG models are the explicit formula forms for determining the decision-making parameters to avoid major attacks by executing preliminary operations beforehand.
The paper is organized as follows: Section 2 summarizes the stochastic models of BGG and SABGG. This section also explains how MLBGG is linked to two fundamental models. All mathematical models are also fully listed along with the condensed proofs in this section. In Section 3, two major BGG applications which were adapted into connected cars and a smart drone swarm are included. The BGG optimizations for these application are also demonstrated in this section. Finally, Section 4 contains the conclusion which indicates the direction of future research based on Blockchain Governance Games.

2. Stochastic Models of Blockchain Governance Game Variants

All BGGs are mathematically designed to ensure the feasibility of the model. This section briefly explains the theories of BGG models, which are essentially stochastic models that provide analytically tractable results using fluctuation theory and mixed-strategy game theory. The results allow us to predict the uptime and determine the optimal number of backup nodes to protect the blockchain network. The governance in a blockchain network follows decision parameters such as the time that elapses before an attacker has captured more than half of all nodes. Any action must not be taken until one step before the first pass time expires. Even if an attacker captures less than half the nodes, there is still a possibility that all nodes will be dominated by an attacker.

2.1. Blockchain Governance Game

The BGG is an antagonistic game model with the fluctuation model to analyze the network to enable decision making for preliminary security measures before attacks. The model aims to prevent blockchain-based attacks and keep the network decentralized. In the BGG, an attacker is trying to build an alternative blockchain faster than regular miners [1] and a defender only keeps a small percentage of the nodes that are released before the attack (see Figure 1).
The two-player antagonistic stochastic game describes the blockchain network between a defender (player H) and an attacker (player A). The BGG aims to prevent the 51 percent attack and keep the network decentralized. Both players compete to build the blocks either for honest or false ones. Let us assign that
A : = k 0 X k ε s k , s 0 = 0 < s 1 < s 2 < , a . s .
H : = j 0 Y j ε t j , t 0 = 0 < t 1 < t 2 < , a . s .
are measurable marked Poisson processes ( ε a is a point mass at a) with respective intensities λ a and λ h . The computing performances for generating blocks by corrupted and honest nodes in the network are related with these two random variables. Although the traffic data processing and transmission delay could be modeled with the general input process, the Markovian input process, which is basically the Poisson process, is also widely applied into stochastic modeling for network analysis [38,39]. Player A builds the blocks with false transactions (e.g., double spend) at times s 1 , s 2 , and sustains the respective building blocks of magnitudes X 1 , X 2 , formalized by the process A . The building blocks to player H who generates the honest blocks are similarly described by the process H . The processes A and H could be specified by their transforms
E g A s = e λ a s g 1 , E z H t = e λ h t z 1 .
The BGG is randomly observed in accordance with the point process which is equivalent with the duration of the proof-of-work (PoW) completion (approximately 10 min in the Bitcoin) in the blockchain network [14]. The observation process is assumed to be a delayed renewal process:
T : = i 0 ε τ i , τ 0 > 0 ) , τ 1 , ,
and let us consider the combined process as follows:
A t , H t : = A H 0 , τ k , k = 0 , 1 , .
with respective increments upon A H . Therefore, this process embedded over T could be defined as follows:
X k , Y k : = A H τ k 1 , τ k , k = 1 , 2 , , X 0 = A 0 , Y 0 = H 0 ,
then the observation process is formalized as
A τ H τ : = k 0 X k , Y k ε τ k ,
where
A τ = i 0 X i ε τ i , H τ = i 0 Y i ε τ i ,
where X k and Y k are dependent on the notation Δ k : = τ k τ k 1 , k = 0 , 1 , , τ 1 = 0 , and the magical transforms of increments are as follows:
γ g , z = E g X k · z Y k = δ λ a 1 g + λ h 1 z ,
γ 0 g , z = E g A 0 z H 0 = δ 0 λ a 1 g + λ h 1 z ,
where
| g | < 1 , | z | < 1 , δ θ = E e θ Δ 1 , δ 0 θ = E e θ τ 0 .
The stochastic process A τ H τ describes the evolution of a conflict between players with an observation process T = τ 0 , τ 1 , . The game is over when, on the k-th observation epoch τ k , the collateral building blocks to player A exceeds more than the half of the total nodes M. To further formalize the game, the exit index is introduced:
ν : = i n f k : A k = A 0 + X 1 + + X k M 2 ,
μ : = i n f j : H j = H 0 + Y 1 + + Y j M 2 .
The first passage time τ ν is the associated exit time from the confined game and the Formula (7) is modified as follows:
A τ ¯ H τ ¯ : = k 0 ν X k , Y k ε τ k ,
which the path of the game from F Ω ν < μ , which gives an exact definition of the model observed until τ ν . We shall be targeting the confined game in the view point of player A (an attacker) because an attacker beats a defender at time τ ν , otherwise, an honest node generates correct blocks. The joint functional of the blockchain network model is as follows:
Φ M 2 = Φ M 2 ξ , g 0 , g 1 , z 0 , z 1 = E ξ ν · g 0 A ν 1 · g 1 A ν · z 0 H ν 1 · z 1 H ν 1 ν < μ ,
The above functional represents the status of genuine and corrupted nodes upon the exit moment τ ν . The latter is of particular interest as we are interested in not only the prediction of catching up the blocks by attackers but also one observation prior to this. The Theorem BGG-1 establishes an explicit formula Φ M 2 from (14) and (15) which is based on the first exceed model by Dshahalow [40,41]. The operators of the first exceed model are defined as follows:
D x , y f x , y u , v : = 1 u 1 v x 0 y 0 f x , y u x v y ,
then
f x , y = D u , v x , y D x , y f x , y ,
where f x , y is a sequence, with the inverse
D u , v m , n = 1 m ! · n ! lim u , v 0 m n u m v n 1 1 u 1 v , m 0 , n 0 , 0 , otherwise .
Theorem BGG-1. 
The functional Φ M 2 of the process of (15) satisfies following expression:
Φ M 2 = D u , v M 2 , M 2 Γ 0 1 Γ 0 + ξ · γ 0 1 ξ γ Γ 1 Γ .
where
γ : = γ g 0 g 1 u , z 0 z 1 v ,
γ 0 : = γ 0 g 0 g 1 u , z 0 z 1 v ,
Γ : = γ g 1 u , z 1 v ,
Γ 0 : = γ 0 g 1 u , z 1 v ,
Γ 1 : = γ g 1 , z 1 v ,
Γ 0 1 : = γ 0 g 1 , z 1 v .
The probability generating functions (PGFs) of A ν 1 , A ν and the exit index could be found as follows:
E ξ ν = Φ M 2 ξ , 1 , 1 , 1 , 1 ,
E g 0 A ν 1 = Φ M 2 1 , g 0 , 1 , 1 , 1 ,
E g 1 A ν = Φ M 2 1 , 1 , g 1 , 1 , 1 ,
and the marginal mean of the first exceed index is as follows from (26):
E ν = ξ Φ M 2 ξ , 1 , 1 , 1 , 1 | ξ = 1 .
The special case of the observation process which has the memoryless characteristic is adapted for demonstrating an analytical solution of the BGG model on Appendix A.1. Memoryless observation processes are useful for describing BGG networks because it implicates that there is no additional cost for remembering past information.

2.2. Strategic Alliance for Blockchain Governance Game

SABGG, which is one of BGG variants, provides an alternative way to reserve genuine nodes for defending the network from attackers. The concept of alliance from the strategic management perspectives is applied on the top of a typical stochastic game framework [15]. The strategic alliance in the business is an agreement within multiple parties to pursue a set of agreed upon objectives [42]. This enhanced hybrid theoretical model finds the best strategies towards the preparation for preventing a network failure through allied genuine nodes (see Figure 2).
The security operations are determined by the cost of adding genuine nodes, the number of nodes actively added to a blockchain network, and the total mining power of an attacker. The setup of the basic stochastic model is the same as the BGG model [14] except for managing backup nodes. The competitive non-cooperative game is considered. Two players (called “corrupted” and “genuine”) compete with each other to complete their blocks first. From (1) and (2), measurable marked Poisson processes with respective intensities λ c (an attacker) and λ g (a defender) are as follows:
C : = j 0 J j ε u j , u 0 = 0 < u 1 < u 2 < , a . s .
G : = k 0 K k ε v k , v 0 = 0 < v 1 < v 2 < , a . s .
and a third-party observation point process [14,16] is also defined as follows:
U : = i 0 ε t i , t 0 > 0 , t 1 , t 2 , .
Player C (i.e., an attacker) build the blocks which contain false transactions, including double spending at the times u 1 , u 2 , . These blocks are built with the magnitudes J 1 , J 2 , , formalized by the process C . Similarly, player G generates the blocks which contain the correct transactions with the block of magnitudes K 1 , K 2 , . Both players are competing with each other to build their blocks. The processes C and G are specified by their transforms:
E y C u = e λ c u y 1 , E z G v = e λ g v z 1 ,
and
C i , G i : = C G 0 , t i , i = 0 , 1 , ,
as the forms of an observation process upon C G embedded over t , with respective increments
J i , K i : = C G t i 1 , t i , i = 1 , 2 , , J 0 = C 0 , K 0 = G 0 .
The observation process is formalized as
C t G t : = i 0 J i , K i ε t i ,
where
C t = i 0 J i ε t i , G t = i 0 K i ε t i ,
with position-dependent marking. The functional could be found as follows:
α y , z = E y J i · z K i , | y | 1 , | z | 1 ,
with the notation U i : = t i t i 1 , i = 0 , 1 , , t 1 = 0 . By using the double expectation [3], we have
α y , z = α λ c 1 y + λ g 1 z ,
and
α 0 y , z = E y C 0 z G 0 = α 0 λ c 1 y + λ g 1 z ,
where
α θ = E e θ U 1 , α 0 θ = E e θ t 0 , | x | < 1 , | z | < 1 ,
The game is ended when the total number of corrupted nodes C i in the network becomes more than half of the total nodes by player C (an attacker) or G l to player G (a defender) exceeds more than half of the total nodes, respectively. To further formalize the game, the exit indexes are defined as follows:
ν : = i n f j : C j ( = C 0 + J 1 + + J j ) M 2 ,
ν 2 : = i n f j : C j ( = C 0 + J 1 + + J j ) B η M 2 ,
μ 1 : = i n f i : G i ( = G 0 + K 1 + + K i ) + B η M 2 ,
μ : = i n f l : G l ( = G 0 + K 1 + + K l ) M 2 ,
where B η is the number of available nodes and η is the maximum fixed number of allied nodes in the network system (i.e., B η η ). If player G (a defender) has the allies, player C (an attacker) could only win the game at moment t ν 2 , instead of moment t ν . The game is over at m i n ν , ν 2 , μ 1 , μ . The first passage time t ν is the associated exit time from the confined game and the Formula (36) is modified as
C t ¯ G t ¯ : = n 0 ν J n , K n ε t n ,
which gives an exact definition of the model observed until t ν without the strategic alliance action. The joint functional of the blockchain network model with the strategic alliance is as follows:
Θ M 2 = E ζ ν · y 0 C ν 1 · y 1 C ν · b C ν B η · z 0 G μ 1 · z 1 G μ 1 ν < ν 2 < μ ,
where M indicates the total number of nodes in a blockchain network and this functional represents the status of attackers and defenders upon the exit time t ν . It is noted that we are interested in not only the prediction of catching up the blocks by attackers but also one observation prior to this. The Theorem BGG-2 establishes an explicit formula for Θ M 2 with (46) and (47). Additionally, D - and D -operators from (16) and (18) are extended as follows:
D a , b , c q , r , s g a , b , c : = 1 q 1 r 1 s a 0 b 0 c 0 g a , b , c q a r b s c ,
where | q | < 1 , | r | < 1 , | s | < 1 , then we have
g a , b , c = D q , r , s a , b , c D a , b , c g a , b , c q , r , s ,
where g a , b , c is a sequence, with the inverse
D q , r , s a , b , c = 1 a ! · b ! · c ! lim q , r , s 0 a b c q a r b s c 1 1 q 1 r 1 s , a , b , c 0 0 , otherwise .
Theorem BGG-2. 
The functional Θ M 2 from (47), satisfies the following expression:
Θ M 2 = D q , r , s M 2 , M 2 , M 2 σ η · β 1 β 1 1 β α 0 1 α 0 + ζ α 0 1 ζ α α 1 α ,
where
Φ : = α y 0 y 1 b q r , z 0 z 1 s ,
Φ 0 : = α 0 y 0 y 1 b q r , z 0 z 1 s ,
α : = α y 1 b q , z 1 ,
α 0 : = α 0 y 1 b q , z 1 ,
α 1 : = α y 1 b , z 1 ,
α 0 1 : = α 0 y 1 b , z 1 ,
β : = α b r , s ,
β 1 : = α r , 1 ,
σ η : = E b B η .
From (51), the probability generating functions of C ν 1 , C ν , and the exit index ζ could be found as follows:
E ζ ν = Θ M 2 ζ , 1 , 1 , 1 , 1 , 1 ,
E y 0 C ν 1 = Θ M 2 1 , y 0 , 1 , 1 , 1 , 1 ,
E y 1 C ν = Θ M 2 1 , 1 , y 1 , 1 , 1 , 1 ,
E b C ν B η = Θ M 2 1 , 1 , 1 , b , 1 , 1 .
The marginal mean of the first exceed index E ν and the moment of security operation E τ ν 1 are found from (51) and (61):
E ν = ζ Θ M 2 ζ , 1 , 1 , 1 , 1 , 1 | ζ = 1 ,
E t ν 1 = E t 0 + E U 1 E ν 1 .
Although the original BGG in Section 2.1 is an innovative idea in itself for the decentralized network security enhancement, certain numbers of real nodes must be reserved in advance. This is one of the reasons why the strategic alliance concept is being adapted for a BGG successor. Additionally, it is noted that the memoryless observation process has been applied for SABGG networks on Appendix A.2.

2.3. Multi-Layered Blockchain Governance Game

The MLBGG is a combined stochastic game model based on the two-layered BGG network [16]. Layer-0 is a single SABGG-based network and Layer-1 is a set of multiple BGG-based networks (see Figure 3). This innovative multi-layer networking framework makes it easy for BGGs to apply various hierarchical system architectures, including IoT server networks [16], edge fog computing [43,44] and hierarchical network systems [45,46].
This functional represents the status of an attacker and honest nodes upon the exit time τ ν l , l = { 0 , 1 , , η } . Let us consider the matrix of a function f x , y and G u , v as follows:
f x , y : = f 0 x , y f 1 x , y f n x , y , G u , v : = G 0 u , v G l u , v G η u , v ,
and the matrix operators based on the first exceed model from Theorem BGG-1 are adapted as follows:
D f x , y : = D x , y f = 1 u 1 v f 0 x , y u x v y 1 u 1 v f 1 x , y u x v y 1 u 1 v f l x , y u x v y 1 u 1 v f n x , y u x v y ,
and
D M r 1 G u , v : = D u , v m 0 , n 0 G 0 u , v D u , v m 1 , n 0 G 1 u , v D u , v m l , n l G l u , v D u , v m n , n n G r u , v , M r = m 0 n 0 m 1 n 1 m r n r .
The new matrix operators for matrix calculations were additionally introduced in this research [16] and the functional matrix for all blockchain networks in Layer-1 is as follows:
Φ M η 1 = Φ M 0 2 0 Φ M l 2 l Φ M η 2 η = D M η 1 G u , v , M η = M 0 2 M 0 2 M l 2 M l 2 M η 2 M η 2 ,
and
Φ M l 2 l = D u , v M l 2 , M l 2 Γ 0 1 Γ 0 + ξ · γ 0 1 ξ γ Γ 1 Γ , l = { 0 , , η } ,
where
γ : = γ l g 0 g 1 u , z 0 z 1 v ,
γ 0 : = γ 0 l g 0 g 1 u , z 0 z 1 v ,
Γ : = γ l g 1 u , z 1 v ,
Γ 0 : = γ 0 l g 1 u , z 1 v ,
Γ 1 : = γ l g 1 , z 1 v ,
Γ 0 1 : = γ 0 l g 1 , z 1 v .
From (71), the probability-generating functions (PGFs) for A ν l 1 l , A ν l l , and the exit index ν l of the l-th BGG network in the Layer-1 are determined as follows:
E ξ ν l = Φ M l 2 l ξ , 1 , 1 , 1 , 1 ,
E g 0 A ν l 1 l = Φ M l 2 l 1 , g 0 , 1 , 1 , 1 ,
E g 1 A ν l l = Φ M l 2 l 1 , 1 , g 1 , 1 , 1 , l = { 0 , , η } .
From (71) and (78), the marginal mean of the decision-making moment for the l-th network in the Layer-1 (i.e., τ ν l 1 ) could be found as follows:
E τ ν l 1 = E τ 0 + E Δ 1 E ν l 1 , l = { 1 , , η } .
where
E ν l = ξ Φ M 2 l ξ , 1 , 1 , 1 , 1 | ξ = 1 .
Alternatively, Layer-0 is mapped with the SABGG and the exit indices are formalized as follows:
ν : = i n f j : C j ( = C 0 + J 1 + + J j ) η 2 ,
ν 2 : = i n f j : C j ( = C 0 + J 1 + + J j ) B 0 η 2 ,
μ : = i n f l : G l ( = G 0 + K 1 + + K l ) η 2 ,
where B 0 ( η ) is the number of available nodes within the ally. The game in Layer-0 is over at m i n ν , ν 2 , μ . The first passage time t ν is the associated exit time from the confined game from (51) which gives an exact definition of the model observed until t ν without the strategic alliance action. The explicit formula of the SABGG [15] is as follows:
Θ η 2 = E ζ ν · y 0 C ν 1 · y 1 C ν · b C ν B η · z 0 G μ 1 · z 1 G μ 1 ν < ν 2 < μ ,
from the Theorem BGG-2 on Section 2.2,
Θ η 2 = D q , r , s η 2 , η 2 , η 2 σ η · β 1 β 1 1 β · α 0 1 α 0 + ζ Φ 0 1 ζ Φ α 1 α ,
where
Φ : = α y 0 y 1 b q r , z 0 z 1 s ,
Φ 0 : = α 0 y 0 y 1 b q r , z 0 z 1 s ,
α : = α y 1 b q , z 1 ,
α 0 : = α 0 y 1 b q , z 1 ,
α 1 : = α y 1 b , z 1 ,
α 0 1 : = α 0 y 1 b , z 1 ,
β : = α b r , s ,
β 1 : = α r , 1 ,
σ η : = E b B η .
The moment of making a decision (i.e., t ν 1 ) of the Layer-0 could be found from (67). Additionally, the probability of bursting the Layer-0 of the blockchain network q 0 s h is determined as follows:
q 0 s g = E 1 C ν η 2 , s g = DoNothing , E 1 C ν η 1 + α 2 , s g = Action .
where α is an overhead portion for protecting Layer-0 (i.e., B 0 = α · η 2 ). The probability of bursting a SABGG network by an attacker could be as follows:
q s g = k > η 2 E 1 C ν = k , s g = DoNothing , E k > η 2 + B 0 E 1 C ν = k , s g = Action ,
where
E 1 C ν = k = E E λ c t ν k k ! · e λ c t ν | t ν .

3. Blockchain Governance Game Applications

This section focuses on two important applications for BGGs. The first application is to implement the BGG into a connected car to track the spare parts of connected cars back through the supply chain to their original manufacturers and preventing counterfeits. A connected car transfers data to others based on an automotive vehicle network (AVN) and cars are equipped for the in-vehicle networks. These car are usually unmanned aerial vehicles (UAVs) which drive artificial intelligence [47,48]. The IoV security is intended to improve fleet management and accident avoidance [25]. The second application is the application of the SABGG to intelligent drone swarms [26]. An intelligent drone is a drone equipped with artificial intelligence (AI) that operates autonomously and without a command center. The SABGG is used to improve the safety of an intelligent drone swarm by estimating the timing of interim actions by ensuring optimal drone accountability. It is noted that verifiable random functions (VRFs) are incorporated into blockchain-based security applications to eliminate the need for heavy computational power for mining [49,50]. The VRF can choose a miner at random, and each node has the same chance of being a miner [51,52]. This method has been modified to select a miner who will map inputs to verifiable pseudo-random outputs. The VRF is assumed to be fully supported for implementing the BGG on real systems.

3.1. Automotive Vehicle Network Security for Connected Cars

Automotive vehicle network (AVN) is a network that connects a number of vehicles and sensors by wireless communication which enables inter-vehicle information sharing as well as network-to-vehicle communications [53]. Blockchain technology might apply to safety monitoring including the replacement of smart car parts. The blockchain-based Internet-of-Vehicles (BIoV) network structure has been designed [25] to handle such situations. This application adapts the BGG into data sharing security and tractability using consensus schemes. The components in a connected car, the equipment of a service center, and a headquarter database are hooked up as one blockchain network (see Figure 4). Each smart component could mechanically or electronically generate random values and share these values with other smart components. Tires, brakes, an engine, a transmitter in a car could be the smart components which shall be capable to communicate with other components and to construct ledgers. A service center could also generate unique values based on registered car databases.
The IoT-enabled components in a connected car generate values based on their mechanical actions and these generated values are shared with all other components including assigned service centers and company headquarters. It is noted that the values from connected car nodes are unique and randomly generated. The enhanced BIoV network (also known as EBIoV) does not have a reward system that requires a high computing power to create ledgers. All nodes in the EBIoV network, including those in service centers and headquarters, have an equal chance of becoming a miner that generates ledgers without requiring a large amount of computing power using the VRF [51,52]. The mechanism for the EBIoV network protection is identical to that of the BGG and the EBIoV network and is secured by adding nodes to reduce the possibility of an attacker intercepting blocks with false control requests. The optimal number of EBIoV nodes and the estimated car value could be analytically solvable and the corresponding total cost function S n , ρ T o t a l is formulated as follows [25]:
S n , ρ T o t a l = c n , ρ 1 q n , ρ 1 + c n , ρ + V q n , ρ 1 p A 1 + V q 0 · 1 p A 1 ,
where
p A 1 = k = 0 M 2 λ a δ ˜ λ a δ 0 ˜ + E ν 1 δ ˜ k k ! · e λ a δ 0 ˜ + E ν 1 δ ˜ ,
q 0 1 k = 0 M 2 λ a δ 0 ˜ + E ν 1 δ ˜ k k ! · e λ a δ 0 ˜ + E ν 1 δ ˜ ,
P j = n j ρ j 1 ρ n j .
The total cost could be minimized by finding a proper parameter set n , ρ , constituting a combination of an acceptance rate and the number of total backup nodes from headquarters. The optimal parameter set n * , ρ * minimizes the cost function from (100). The demonstration for optimizing the cost function is shown in Figure 5.
The time for requesting the additional nodes shall be the moment τ ν 1 , which is one step prior to the moment in which an attacker catches more than half of the whole nodes. This application has established the enhanced blockchain-based IoV network architecture by bringing a theoretical stochastic model. The EBIoV aims to design an advanced secure IoT network architecture for protecting a connected car by adapting the BGG.

3.2. Security Architecture of Smart Drone Swarm

The advanced secured drone swarm network structure is introduced when the drones in a swarm are connected to one another and the swarm is hooked up as a single blockchain network [26]. Such a drone swarm (i.e., of smart drones) could operate their tasks artificially and independently despite their disconnection with the command center. It is noted that each drone randomly generates unique data and broadcasts these data to others. These random generations are equivalent to transactions in a typical blockchain network (see Figure 6).
All drones in the swarm network shall have nearly equal chances of generating the blocks without or only with minimal computational power by applying the VRF on the Ethereum virtual machine (EVM). Although the VRF could be implemented on other blockchain network environments, the EVM has more flexibility in terms of implementing a new consensus mechanism including VRF and WMSR (the weighted-mean-subsequence-reduced) algorithms. Instead of VRF, the WMSR algorithm might be an alternative choice for achieving resilient consensus in decentralized sensor networks and smart robots [43,44,45,46]. The mechanism for protecting a smart drone swarm network is identical to the SABGG. The governance in a swarm network is driven by the decision-making parameters which include a prior time before catching more than half of the total drones by an attacker and the cost function could be defined as follows:
S ϱ = c ϱ 1 q η 1 + c ϱ + V q 1 ϱ p A 1 + V · q 0 1 p A 1 ,
where
p A 1 1 k = 0 M 2 λ a γ 0 ˜ + E ν 1 γ ˜ k k ! · e λ a γ 0 ˜ + E ν 1 γ ˜ ,
q 1 ϱ = j = 0 M 2 1 k M 2 + j λ a δ 0 ˜ + E ν 1 δ ˜ k ! · e λ a δ 0 ˜ + E ν 1 δ ˜ P j ,
P j = M 2 1 j ϱ j 1 ϱ M 2 1 j .
The total cost S ϱ shall be minimized by the given ϱ , which is the optimal value of alliance accountability (i.e., the acceptance rate) from (104). After the demonstration from previous research [26], the minimum cost of performing an operation of the intelligent drone swarm with a certain proportion of the acceptance rate for the alliance request to other drones could be analytically calculated. The moment of alliance request τ ν 1 shall be one step prior to the time when an attacker catches more than half of the total drones. This practice aims to simulate smart drone management and its visualization of the results (see Figure 7).
An advanced secure drone swarm network architecture protects a drone swarm from an attacker by adapting a Blockchain Governance Game variant. The SABGG, which has been analytically proven [15], was adapted for a decentralized network to improve the drone swarm security [26].

4. Conclusions and Future Research

This paper offers a comprehensive review on the BGGs and their flagship applications which have been actively studied recently. All BGG models are mathematically fully proven without any numerical approach. The great strength of the BGG models is that they provide analytically tractable solutions as explicit formula forms for determining the decision-making parameters to avoid major attacks by executing preliminary operations beforehand. The BGG models shall be extended to various blockchain-based cybersecurity areas including IoT security and a secured decentralized service network design. Their network architecture design could be widely applied in various application domains including cybersecurity, network architecture, service design and IT business models as long as a blockchain network is considered as their security enhancement. The innovative mathematical models are targeted to improve the security based on the network’s architectural perspectives. Although all theoretically BGG models and major applications are mathematically proven, some challenges are as follows:
  • AI-enabled BGG model: predicting the moment of attacks is always challenging and adapting machine learning techniques for forecasting could be considered to improve the BGG models.
  • Developing the applications for MLBGG: the direct applications for MLBGG (multi-layered BGG) have not been found to date.
  • Actual implementations of BGG models: implementing BGG models with the VRF on real blockchain networks is a challenging task. It is noted that the VRF shall be implemented on the Ethereum virtual machine before implementing the BGGs to see how these theorical models actually work.
All the above challenges shall be considered future research topics and anyone can freely invest in the above challenges as their research topics. This review is expected to be helpful in launching a new blockchain-based service with the improvement of network security based on BGG. It is predicted that more and more complex security threats will emerge, which will in turn require the development of more advanced defense techniques to detect and combat such threats. Therefore, it is foreseeable that ensuring the robustness of defenses against network attacks will become a priority and an industry standard.

Funding

This work has been supported in part by the Macao Polytechnic University (MPU) under Grant RP/FCA-04/2023.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

There are no available data to be stated.

Acknowledgments

Special thanks to all reviewers who provided valuable comments to make this paper complete.

Conflicts of Interest

The author declares no conflict of interest.

Appendix A. The Marginal Mean of the First Exceed Index under Memoryless Observation Process

Let us consider that the observation process has the memoryless property. This observation process is really practical for the actual implementations of BGG and SABGG models because it indicates that a defender (or a service provider) does not spend the additional cost of storing past information.

Appendix A.1. Memoryless BGG Model

To build the cost function of the BGG, we need to find the marginal mean of the first exceed index from (29) to determine the decision-making moment τ ν 1 , which could be found as follows:
E τ ν 1 = E τ 0 + E Δ 1 E ν 1 .
Recalling from (18), the operator D a q is determined as follows:
G u = 1 u x 0 f x u x ,
and
D x , y f 1 x f 2 y u , v = D x f 1 x D y f 2 y ,
then
f x , y = D u , v x , y D x , y f x , y ,
f 1 x f 2 y = D u x D x f 1 x D v y D y f 2 y ,
where f x , f 1 x f 2 y are a sequence, with the inverse (18) and
D u m = 1 m ! lim u 0 m u m 1 1 u , m 0 , 0 , otherwise ,
and
D u , v m , n G 1 u G 2 v = D u m G 1 u D v n G 2 v .
The functional D is defined on the space of all analytic functions at 0 and it has the following properties:
  • D u m is a linear functional with fixed points at constant functions;
  • D u m k = 0 a k u k = k = 0 m a k .
It is also noted that Formulas (20)–(25) could be rewritten as follows:
γ = γ a · γ h : = γ a g 0 g 1 u γ h z 0 z 1 v ,
γ 0 = γ a 0 · γ h 0 : = γ a 0 g 0 g 1 u γ h 0 z 0 z 1 v ,
Γ : = γ a g 1 u γ h z 1 v ,
Γ 0 : = γ a 0 g 1 u γ h 0 z 1 v ,
Γ 1 : = γ a g 1 γ h z 1 v ,
Γ 0 1 : = γ a 0 g 1 γ h 0 z 1 v .
Recalling from (26), the formula is assigned as follows:
E ξ ν = Φ M 2 ξ , 1 , 1 , 1 , 1 = L 1 + L 2 L 3 ,
where
L 1 = D u , v M 2 , M 2 γ h 0 v γ a 0 u γ h 0 v ,
L 2 = D u , v M 2 , M 2 ξ · γ a 0 u γ h 0 v γ h v 1 ξ γ a u γ h v ,
L 3 = D u , v M 2 , M 2 ξ · γ a 0 u γ h 0 v γ a u γ h v 1 ξ γ a u γ h v .
Since the observation process has memoryless properties, the process is exponentially distributed and the functionals from (9)–(11) are as follows:
γ a 0 u = 1 1 + δ 0 ˜ · λ a δ 0 ˜ · λ a u = β a 0 1 α a 0 · u ,
γ a u = 1 1 + δ ˜ · λ a δ ˜ · λ a u = β a 1 α a · u ,
γ h 0 v = 1 1 + δ 0 ˜ · λ h δ 0 ˜ · λ h v = β h 0 1 α h 0 · v ,
γ h v = 1 1 + δ ˜ · λ h δ ˜ · λ h v = β h 1 α h · v ,
β a 0 = 1 1 + δ 0 ˜ · λ a , α a 0 = δ 0 ˜ · λ a 1 + δ 0 ˜ · λ a ,
β a = 1 1 + δ ˜ · λ a , α a = δ 0 ˜ · λ a 1 + δ ˜ · λ a ,
β h 0 = 1 1 + δ 0 ˜ · λ h , α h 0 = δ 0 ˜ · λ h 1 + δ 0 ˜ · λ h ,
β h = 1 1 + δ ˜ · λ h , α h = δ 0 ˜ · λ h 1 + δ ˜ · λ h ,
where δ 0 ˜ = E τ 0 and δ ˜ = E Δ k . From (A15), we have
L 1 = β h 0 1 α h 0 M 2 + 1 1 α h 0 1 β a 0 1 α a 0 M 2 + 1 1 α a 0 ,
and from (A16),
L 2 = n 0 ξ n + 1 β a 0 · β a n · j = 0 M 2 1 j α a α a 0 j ψ n 1 a j · β h 0 · β h n + 1 · k = 0 M 2 1 k α h α H 0 k ψ n h k ,
and from (A17),
L 3 = n 0 ξ n + 1 β a 0 · β a n + 1 · j = 0 M 2 1 j α a α a 0 j ψ n a j · β h 0 · β h n + 1 · k = 0 M 2 1 k α h α h 0 k ψ n h k ,
where
ψ n a j = i = 0 j n + i i 1 i α a α a 0 i ,
ψ n h k = i = 0 k n + i i 1 i α h α h 0 i .
From (29) and (A14)–(A17), the mean of the first exceed index is determined as follows:
E ν = β a 0 β h 0 β h n 0 n β a β h n Ξ n 1 h M 2 Ξ n 2 a M 2 Ξ n 1 a M 2 β a ,
where
Ξ n a m = j = 0 m 1 j α a α a 0 j ψ n a j ,
Ξ n h m = k = 0 m 1 k α h α h 0 k ψ n h k .

Appendix A.2. Memoryless SABGG Model

To build the cost function of the SABGG, we need to find the marginal mean of the first exceed index from (65) to determine the marginal mean of t ν 1 , which could be found as follows:
E t ν 1 = E t 0 + E U 1 E ν 1 .
From (A2), the D - and D -operators could be operated as follows:
D x , y , z f 1 x f 2 y f 3 z u , v = D x f 1 x D y f 2 y D z f 3 z ,
and
D u , v , w m , n , r G 1 u G 2 v G 3 w = D u m G 1 u D v n G 2 v D w r G 3 w .
then we have
f x , y , z = D u , v , w x , y , z D x , y , z f x , y , z ,
f 1 x f 2 y f 3 z = D u x D x f 1 x D v y D y f 2 y D w z D z f 3 z ,
where f x , f 1 x f 2 y f 3 z are a sequence, with the inverse (18). Recalling from (65), the formula is assigned as follows:
E ζ ν = Θ M 2 ζ , 1 , 1 , 1 , 1 , 1 = R 1 + R 2 R 3 ,
where
R 1 = a g b c b g 1 b c b g Ξ M 2 0 1 b c + b c l 0 M 2 a c 0 l Ξ M 2 0 b c 0 a g k 0 M 2 1 + a g b c b g 1 b c b g k + 1 l 0 M 2 a c 0 l ,
R 2 = ζ b c 0 b c b g 0 a c 0 1 b c b g a c a g a c + 1 · l 0 a g 0 l Ξ M 2 l ζ a g Ξ M 2 l 1 ζ j = l j l 1 a g 0 j + 1 ,
R 3 = ζ b c b c 0 2 1 b c b g a c a g a c + 1 · h 0 k h a g 0 h 1 k = h a c 0 a g 0 k Ξ M 2 h ζ a g Ξ M 2 h 1 ζ + ζ b c 0 b g 0 b c 2 a c 0 1 a c 1 1 b c b g a c a g 1 a c · h 0 k h a g 0 h k h a c 0 a g 0 k + 1 Ξ M 2 h ζ a g k Ξ M 2 h 1 ζ ,
and
Ξ M 2 0 : = u = 0 m M 2 ! M 2 u ! h = 1 M 2 h ! 1 a c 1 b c b g ,
Ξ m ζ = u = 0 m m ! m u ! l = 1 m l ! 1 a g 0 1 ζ b c 0 b g 0 ,
and
b c 0 = 1 1 + α 0 ˜ · λ c , a c 0 = α 0 ˜ · λ c 1 + α 0 ˜ · λ c ,
b c = 1 1 + α ˜ · λ c , a c = α ˜ · λ c 1 + α ˜ · λ c ,
b g 0 = 1 1 + α 0 ˜ · λ g , a g 0 = α 0 ˜ · λ g 1 + α 0 ˜ · λ g ,
b g = 1 1 + α ˜ · λ g , a g = α ˜ · λ g 1 + α ˜ · λ g ,
where α 0 ˜ = E t 0 and α ˜ = E U k from (41). The marginal mean of the first exceed index E ν could be followed from (65) and (A36)–(A38).

References

  1. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 1 December 2021).
  2. Beikverdi, A.; Song, J. Trend of centralization in Bitcoin’s distributed network. In Proceedings of the 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Takamatsu, Japan, 1–3 June 2015; pp. 1–6. [Google Scholar]
  3. Yli-Huumo, I.; Ko, D.; Choi, S.; Park, S.; Smolander, K. Where Is Current Research on Blockchain Technology? A Systematic Review. PLoS ONE 2016, 11, e0163477. [Google Scholar] [CrossRef] [PubMed]
  4. Liu, Z.; Luong, N.C.; Wang, W.; Niyato, D.; Wang, P.; Liang, Y.-C.; Kim, D.I. A Survey on Applications of Game Theory in Blockchain (2019). Available online: https://arxiv.org/abs/1902.10865 (accessed on 1 May 2019).
  5. Decker, C.; Wattenhofer, R. Information propagation in the Bitcoin network. In Proceedings of the IEEE P2P 2013 Proceedings, Trento, Italy, 9–11 September 2013; pp. 1–10. [Google Scholar]
  6. Kim, W. Bitcoin, Blockchain Mechanism and Its Evolution. 2018. Available online: http://www.itfind.or.kr/publication/ (accessed on 1 December 2021). (In Korean).
  7. Narayanan, A.; Clar, J. Bitcoin’s Academic Pedigree. Mag. Commun. ACM 2017, 60, 36–45. [Google Scholar] [CrossRef]
  8. Weiss, M.; Corsi, E. Bitfury: Blockchain for Government. HBP Case 2018, 12, 818-031. [Google Scholar]
  9. Armknecht, F.; Karame, G.O.; Mandal, A.; Youssef, F.; Zenner, E. Ripple: Overview and Outlook. In Trust and Trustworthy Computing, Proceedings of the 8th International Conference, Heraklion, Greece, 24–26 August 2015; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2015; Volume 9229, pp. 163–180. [Google Scholar]
  10. Bhuiyan, B. An Overview of Game Theory and Some Applications. Philos. Prog. 2016, 59, 111–128. Available online: https://www.banglajol.info/index.php/PP/article/view/36683 (accessed on 1 May 2019). [CrossRef]
  11. Antonopoulos, A.M. Mastering Bitcoin: Programming the Open Blockchain, 2nd ed.; O’Reilly: Sebastopol, CA, USA, 2017. [Google Scholar]
  12. Eyal, I.; Sirer, E. Majority Is Not Enough: Bitcoin Mining Is Vulnerable; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2014; Volume 8437, pp. 436–454. [Google Scholar]
  13. Garay, J.; Kiayias, A.; Leonardos, N. The Bitcoin Backbone Protocol: Analysis and Applications; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2015; Volume 9057, pp. 281–310. [Google Scholar]
  14. Kim, S.-K. Blockchain Governance Game. Comput. Ind. Eng. 2019, 136, 373–380. [Google Scholar] [CrossRef]
  15. Kim, S.-K. Strategic Alliance for Blockchain Governance Game. Probab. Eng. Inf. Sci. 2020, 36, 184–200. [Google Scholar] [CrossRef]
  16. Kim, S.-K. Multi-Layered Blockchain Governance Game. Axioms 2022, 11, 109. [Google Scholar] [CrossRef]
  17. Kang, J.; Xiong, Z.; Niyato, D.; Ye, D.; Kim, D.I.; Zhao, J. Toward Secure Blockchain-Enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory. IEEE Trans. Veh. Technol. 2019, 68, 2906–2920. [Google Scholar] [CrossRef]
  18. Lohachab, A.; Garg, S.; Kang, B.; Amin, M.B.; Lee, J.; Chen, S.; Xu, X. Towards Interconnected Blockchains: A Comprehensive Review of the Role of Interoperability among Disparate Blockchains. ACM Comput. Surv. 2021, 54, 1–39. [Google Scholar] [CrossRef]
  19. Erfan, F.; Bellaiche, M.; Halabi, T. Game-theoretic Designs for Blockchain-based IoT: Taxonomy and Research Directions. In Proceedings of the 2022 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), Newark, CA, USA, 15–18 August 2022; pp. 27–37. [Google Scholar]
  20. Liu, Y.; Lu, Q.; Zhu, L.; Paik, H.Y.; Staples, M. A systematic literature review on blockchain governance. J. Syst. Softw. 2023, 197, 111576. [Google Scholar] [CrossRef]
  21. Alkadi, R.; Alnuaimi, N.; Yeun, C.Y.; Shoufan, A. Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues. IEEE Access 2022, 10, 14463–14479. [Google Scholar] [CrossRef]
  22. Liu, Z.; Luong, N.C.; Wang, W.; Niyato, D.; Wang, P.; Liang, Y.C.; Kim, D.I. A Survey on Blockchain: A Game Theoretical Perspective. IEEE Access 2019, 7, 47615–47643. [Google Scholar] [CrossRef]
  23. Yang, X.; Gong, G.; Tian, Y. Optimal Game Theory in Complicated Virtual-modeling and CGF Decision-making with Multi-granularities. In Proceedings of the 2008 International Conference on Smart Manufacturing Application, Goyangi, Republic of Korea, 9–11 April 2008; pp. 95–99. [Google Scholar]
  24. Yang, X.; Gong, G.; Tian, Y. Generalized Optimal Game Theory in virtual decision-makings. In Proceedings of the 2008 Chinese Control and Decision Conference, Yantai, China, 2–4 July 2008; pp. 196–1964. [Google Scholar]
  25. Kim, S.-K. Enhanced IoV Security Network by Using Blockchain Governance Game. Mathematics 2021, 9, 109. [Google Scholar] [CrossRef]
  26. Kim, S.-K. Advanced Drone Swarm Security by Using Blockchain Governance Game. Mathematics 2022, 10, 3338. [Google Scholar] [CrossRef]
  27. Ramirez, M.A.; Kim, S.-K.; Al Hamadi, H.; Damiani, E.; Byon, Y.-J.; Kim, Y.-J.; Cho, C.-S.; Yeun, C.Y. Poisoning Attacks and Defenses on Artificial Intelligence: A Survey. 2022. Available online: https://arxiv.org/abs/2202.10276 (accessed on 1 April 2023).
  28. Biggio, B.; Corona, I.; Maiorca, D.; Nelson, B.; Šrndić, N.; Laskov, P.; Giacinto, G.; Roli, F. Evasion attacks against machine learning at test time. Proc. Joint Eur. Conf. Mach. Learn. Knowl. Discov. Databases 2013, 8190, 387–402. [Google Scholar]
  29. Paudice, A.; Muñoz-González, L.; Gyorgy, A.; Lupu, E.C. Detection of adversarial training examples in poisoning attacks through anomaly detection. arXiv 2018, arXiv:1802.03041. [Google Scholar]
  30. Liu, X.; Xie, L.; Wang, Y.; Zou, J.; Xiong, J.; Ying, Z.; Vasilakos, A.V. Privacy and Security Issues in Deep Learning: A Survey. IEEE Access 2020, 9, 4566–4593. [Google Scholar] [CrossRef]
  31. Xue, M.; Yuan, C.; Wu, H.; Zhang, Y.; Liu, W. Machine Learning Security: Threats, Countermeasures, and Evaluations. IEEE Access 2020, 8, 4720–74742. [Google Scholar] [CrossRef]
  32. Qi, X.; Zeyi, T.; Zijiang, H.; Qun, L. FABA: An algorithm for fast aggregation against byzantine attacks in distributed neural networks. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence (IJCAI), Macao, China, 10–16 August 2019; pp. 4824–4830. [Google Scholar]
  33. Wang, B.; Gong, N.Z. Stealing hyperparameters in machine learning. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–24 May 2018; pp. 36–52. [Google Scholar]
  34. Tramer, F.; Zhang, F.; Juels, A.; Reiter, M.K.; Ristenpart, T. Stealing machine learning models via prediction apis. In Proceedings of the 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, 11 August 2016; pp. 601–618. [Google Scholar]
  35. Juuti, M.; Szyller, S.; Marchal, S.; Asokan, N. PRADA: Protecting against DNN model stealing attacks. arXiv 2018, arXiv:1805.02628. [Google Scholar]
  36. Chen, Z.; Lv, N.; Liu, P.; Fang, Y.; Chen, K.; Pan, W. Intrusion Detection for Wireless Edge Networks Based on Federated Learning. IEEE Access 2020, 8, 217463–217472. [Google Scholar] [CrossRef]
  37. Chakarov, A.; Nori, A.; Rajamani, S.; Sen, S.; Vijaykeerthy, D. Debugging machine learning tasks. arXiv 2016, arXiv:1603.07292v1. [Google Scholar]
  38. Kleinrock, L. Queueing Systems, Volume 1: Theory; Wiley-Interscience: New York, NY, USA, 1975. [Google Scholar]
  39. Kim, Y.; Lim, H. Multi-Agent Reinforcement Learning-Based Resource Management for End-to-End Network Slicing. IEEE Access 2021, 9, 56178–56190. [Google Scholar] [CrossRef]
  40. Dshalalow, J.H. First Excess Level Process, Advances in Queueing; CRC Press: Boca Raton, FL, USA, 1995; pp. 244–261. [Google Scholar]
  41. Dshalalow, J.H.; Ke, H.-J. Layers of noncooperative games. Nonlinear Anal. 2009, 71, 283–291. [Google Scholar] [CrossRef]
  42. Whittington, R.; Regnér, P.; Angwin, D.; Johnson, G.; Scholes, K. Exploring Strategy Text and Cases, 11th ed.; Pearson: Harlow, UK, 2017. [Google Scholar]
  43. Dorri, A.; Steger, M.; Kanhere, S.S.; Jurdak, R. BlockChain: A Distributed Solution to Automotive Security and Privacy. IEEE Commun. Mag. 2017, 55, 119–125. [Google Scholar] [CrossRef]
  44. Baker, J. Edge Computing—The New Frontier of the Web. 2017. Available online: https://hackernoon.com/edge-computing-a-beginners-guide-8976b6886481 (accessed on 1 December 2021).
  45. ERPINNEW. Fog Computing vs. Edge Computing. 2017. Available online: https://erpinnews.com/fog-computing-vs-edge-computing (accessed on 1 May 2019).
  46. Cisco Networking Academy. Connecting Networks Companion Guide; Cisco Press: Indianapolis, IN, USA, 2014. [Google Scholar]
  47. Rouse, M. Internet of Vehicles. 2018. Available online: https://whatis.techtarget.com/definition/Internet-of-Vehicles (accessed on 1 May 2019).
  48. Kim, S.; Shrestha, R. Internet of Vehicles, Vehicular Social Networks, and Cybersecurity. In Automotive Cyber Security; Springer: Singapore, 2020. [Google Scholar]
  49. Micali, S.; Vadhan, S.; Rabin, M. Verifiable random functions. In Proceedings of the 40th IEEE Symposium on Foundations of Computer Science, New York, NY, USA, 17–19 October 1999; pp. 120–130. [Google Scholar]
  50. Dodis, Y.; Yampolskiy, A. A Verifiable Random Function with Short Proofs and Keys. Lect. Notes Comput. Sci. 2005, 3386, 416–431. [Google Scholar]
  51. Gorbunov, S. Algorand Releases First Open-Source Code: Verifiable Random Function. 2018. Available online: https://medium.com/algorand/ (accessed on 1 May 2019).
  52. Zhao, W. MIT Professor’s Blockchain Protocol Nets 62 Million in New Funding. 2018. Available online: https://www.coindesk.com/mit-professors-Blockchain-protocol-nets-62-million-in-new-funding (accessed on 1 May 2019).
  53. Kihei, B.; Copeland, J.A.; Chang, Y. Automotive Doppler sensing: The Doppler profile with machine learning in vehicle-to-vehicle networks for road safety. In Proceedings of the 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Sapporo, Japan, 3–6 July 2017; pp. 1–5. [Google Scholar]
Figure 1. Blockchain Governance Game [14].
Figure 1. Blockchain Governance Game [14].
Mathematics 11 02273 g001
Figure 2. Strategic Alliance For Blockchain Governance Game [15].
Figure 2. Strategic Alliance For Blockchain Governance Game [15].
Mathematics 11 02273 g002
Figure 3. Multi-Layered Blockchain Governance Game [16].
Figure 3. Multi-Layered Blockchain Governance Game [16].
Mathematics 11 02273 g003
Figure 4. BGG Application for the EBIoV architecture [25].
Figure 4. BGG Application for the EBIoV architecture [25].
Mathematics 11 02273 g004
Figure 5. Optimization Example for the EBIoV [25].
Figure 5. Optimization Example for the EBIoV [25].
Mathematics 11 02273 g005
Figure 6. SABGG application for the drone swarm network architecture [26].
Figure 6. SABGG application for the drone swarm network architecture [26].
Mathematics 11 02273 g006
Figure 7. Optimization practices for the drone swarm security [26].
Figure 7. Optimization practices for the drone swarm security [26].
Mathematics 11 02273 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kim, S.-K. Various Blockchain Governance Games: A Review. Mathematics 2023, 11, 2273. https://doi.org/10.3390/math11102273

AMA Style

Kim S-K. Various Blockchain Governance Games: A Review. Mathematics. 2023; 11(10):2273. https://doi.org/10.3390/math11102273

Chicago/Turabian Style

Kim, Song-Kyoo (Amang). 2023. "Various Blockchain Governance Games: A Review" Mathematics 11, no. 10: 2273. https://doi.org/10.3390/math11102273

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop