Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240600153-8.doi: 10.11896/jsjkx.240600153

• Information Security • Previous Articles     Next Articles

Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks

ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang   

  1. School of Information Engineering,Inner Mongolia University of Technology,Hohhot 010080,China
  • Online:2025-06-16 Published:2025-06-12
  • About author:ZHAO Chanchan,born in 1982,Ph.D,associate professor.Her main research interests include mobile edge computing and blockchain.
    SHI Bao,born in 1982,Ph.D,associate professor.His main research interest is image processing.
  • Supported by:
    Natural Science Foundation of Inner Mongolia Autonomous Region(2023LHMS06016) and Basic Scientific Research Business Fee Project of Universities Directly under the Inner Mongolia Autonomous Region(JY20240010,JY20230082).

Abstract: To solve the problem of malicious devices or malicious data in edge computing,this paper proposes a method of node trust evaluation based on edge computing.Firstly,the blockchain technology and the method of building a cloud-edge framework are used to establish the trust relationship between edge devices.Secondly,a trust-based consensus mechanism is added to the overall trust evaluation method,and a time-sensitive function is introduced to determine the timeliness of trust value requirements in different scenarios.Finally,in order to avoid deviations caused by subjective factors in calculating the trust value,a method of adding stability coefficients is proposed to ensure the reliability of the trust value.Simulation experiments validate that the proposed trust evaluation method has a higher success rate of node interaction than other traditional trust evaluation methods at different malicious node ratios.When the malicious node ratio is 20%,the proposed method is similar to other methods,while when the malicious node ratio is 40%,the success rate is 0.82,and when the malicious node ratio is 60%,the success rate is 0.68%.As the normal nodes and malicious nodes’ trust values change over time,they follow opposite trends.The trust value of normal nodes reaches 0.9 in the end,while the trust value of malicious nodes decreases to 0.2.To better observe the change of trust va-lues of nodes,this paper sets the probability of malicious nodes performing malicious behaviors at 50%.The results also show that the proposed trust evaluation method can effectively respond to malicious nodes.Finally,the time consumption is compared in different node conditions,and the results show that the proposed method has lesser time consumption than traditional trust evaluation methods when dealing with a larger number of nodes.Therefore,the proposed method can make effective trust evaluations when facing a large number of malicious nodes.This method aims to determine how to select trusted nodes as target nodes for data storage and transmission,calculate the trust value of edge nodes,and reduce the impact of malicious nodes.

Key words: Edge computing, Blockchain, Trust evaluation, Identity authentication

CLC Number: 

  • TP393
[1]SHI W S,CAO J,ZHANG Q,et al.Edge Computing:Vision and Challenges [J].IEEE Internet of Things Journal,2016,3(5):637-646.
[2]TANG X Y,CAO C,WANG Y X,et al.Computing power network:The architecture of convergence of computing and networking towards 6G requirement [J].China Communications,2021,18(2):175-185.
[3]YANG W,SHI L,LIANG H,et al.Blockchian Empowered Reliable Computation Offloading and Resource Allocation for Mobile Edge Computing Networks [C]//2023 IEEE/CIC International Conference on Communications in China(ICCC).IEEE,2023.
[4]ALWARAFY A,AL-THELAYA K A,ABDALLAHM,et al.A Survey on Security and Privacy Issues inEdge-Computing-Assisted Internet of Things [J].IEEE Internet of Things Journal,2021,8(6):4004-4022.
[5]NIKRAVAN M,HAGHI K.A review on trust management in fog/edge computing:Techniques,trends,and challenges [J].Journal of Network and Computer Applications,2022,204:103402.
[6]ZHENG W Y,CHEN B,HE D B.An adaptive access control scheme based on trust degrees for edge computing[J].Computer Standards&Interfaces,2022,82:103640.
[7]ZHANG L J,ZOU Y F,WANG W Z,et al.Resource allocation and trust computing for blockchain-enabled edge computing system[J].Computers & Security,2021,105:102249.
[8]KONG W P,LI X Y,HOU L Y,et al.A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing[J].IEEE Internet of Things Journal,2022,9:13927-13941.
[9]WEN M,WANG T,ZHANG S B,et al.An active and verifiable trust evaluation approach for edge computing[J].Journal of Cloud Computing,2020,9(1):1-19.
[10]CHEN J Z,WANG X B,SHEN X M.RTE:Rapid and ReliableTrust Evaluation for Collaborator Selection and Time-Sensitive Task Handling in Internet of Vehicles [J].IEEE Internet of Things Journal,2024,11(7):12278-12291.
[11]JAYAKUMAR D,SANTHOSH KUMAR K.Design of mutual trust between the IoT nodes using adaptive network-based fuzzy inference system in edge computing systems [J].Materials Today:Proceedings,2022,56:1795-1801.
[12]LI T,HUANG G S,ZHANG S B,et al.NTSC:a novel trust-based service computing scheme in social internet of things [J].Peer-to-Peer Networking and Applications,2021,14(6):3431-3451.
[13]JIANG F L,ZENG X W.Trust model for wireless network security based on the edge computing[J].Microsystem Technologies,2019,27:1627-1632.
[14]WANG K,CHEN J M,LIANG Z D,et al.A trusted consensus fusion scheme for decentralized collaborated learning in massive IoT domain [J].Information Fusion,2021,72:100-109.
[15]WU X,LIANG J B.A blockchain-based trust managementmethod for Internet of Things [J].Pervasive and Mobile Computing,2021,72:101330.
[16]ABEYSEKARA P,HAI D,QINA K.Data-driven Trust Prediction in Mobile Edge Computing-based IoT Systems [J].IEEE Transactions on Services Computing,2021:1-1.
[17]DEEBAK B D,MEMON F H,KHOWAJA S A,et al.A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems [J].IEEE Internet of Things Journal,2023,10(8):6652-6660.
[18]PAN X,YUAN L Y,HUANG M M.Cross-domain trust evaluation model for IoT based on blockchain and domain trust degree[J].Computer Engineering,2023,49(5):181-190.
[19]HE F,XIAO Z L,WANGX B,et al.Lightweight Flexible Group Authentication Utilizing Historical Collaboration Process Information [J].IEEE Transactions on Communications,2023,71(4):2260-2273.
[1] ZHAO Chanchan, YANG Xingchen, SHI Bao, LYU Fei, LIU Libin. Optimization Strategy of Task Offloading Based on Meta Reinforcement Learning [J]. Computer Science, 2025, 52(6A): 240800050-8.
[2] WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374.
[3] CHEN Yitian, TONG Yinghua. Joint Optimization of UAV Trajectories and Computational Offloading for Space-Air-GroundIntegrated Networks [J]. Computer Science, 2025, 52(4): 74-84.
[4] YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361.
[5] JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368.
[6] WANG Dongzhi, LIU Yan, GUO Bin, YU Zhiwen. Edge-side Federated Continuous Learning Method Based on Brain-like Spiking Neural Networks [J]. Computer Science, 2025, 52(3): 326-337.
[7] DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365.
[8] ZHOU Wenhui, PENG Qinghua, XIE Lei. Study on Adaptive Cloud-Edge Collaborative Scheduling Methods for Multi-object State Perception [J]. Computer Science, 2024, 51(9): 319-330.
[9] WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415.
[10] ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411.
[11] XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446.
[12] SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379.
[13] LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429.
[14] LIU Dong, WANG Ruijin, ZHAO Yanjun, MA Chaoyang, YUAN Haonan. Study on Key Platform of Edge Computing Server Based on ARM Architecture [J]. Computer Science, 2024, 51(6A): 230600119-8.
[15] WANG Zhongxiao, PENG Qinglan, SUN Ruoxiao, XU Xifeng, ZHENG Wanbo, XIA Yunni. Delay and Energy-aware Task Offloading Approach for Orbit Edge Computing [J]. Computer Science, 2024, 51(6A): 240100188-9.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!