IEEE/CAA Journal of Automatica Sinica
Citation: | P. Y. Zhang, M. C. Zhou, C. X. Li, and A. Abusorrah, “Dynamic evolutionary game-based modeling, analysis and performance enhancement of blockchain channels,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, pp. 188–202, Jan. 2023. doi: 10.1109/JAS.2022.105911 |
[1] |
D. E. Kouicem, Y. Imine, A. Bouabdallah and H. Lakhlef, “Decentralized blockchain-based trust management protocol for the Internet of Things,” IEEE Trans. Dependable and Secure Computing, vol. 19, no. 2, pp. 1292–1306, Mar.–Apr. 2022.
|
[2] |
S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” https://bitcoin.org/bitcoin.pdf, 2008.
|
[3] |
G. Malavolta, P. Moreno-Sanchez, A. Kate, M. Maffei, and S. Ravi, “Concurrency and privacy with payment-channel networks,” in Proc. ACM SIGSAC Conf. Computer and Communications Security, Sept. 2017, pp. 455–471.
|
[4] |
M. Moser, I. Eyal, and E. G. Sirer, “Bitcoin covenants,” in Proc. Int. Conf. Financial Cryptography and Data Security, Springer, Berlin, Heidelberg, Feb. 2016, pp. 1746–1761.
|
[5] |
T. Nguyen and M. Thai, “A blockchain-based iterative double auction protocol using multiparty state channels,” ACM Trans. on Internet Technology, vol. 21, no. 2, pp. 1–22, Mar. 2021.
|
[6] |
P. Zhang, C. Li, and M. Zhou, “Game-theoretic modeling and stability analysis of blockchain channels,” in Proc. IEEE Int. Conf. Systems, Man, and Cybernetics, Toronto, 2020, pp. 836–840.
|
[7] |
Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, and Y. Zhang, “Consortium blockchain for secure energy trading in industrial internet of things,” IEEE Trans. Ind. Inform., vol. 14, no. 8, pp. 3690–3700, 2018.
|
[8] |
J. Coleman, L. Horne, and L. Xuanji, “Counterfactual: Generalized state channels,” [Online] Available: https://counterfactual.com/statechannels, 2018.
|
[9] |
H. Cui, Z. Wan, X. Wei, S. Nepal, and X. Yi, “Pay as you decrypt: Decryption oursoucing for functional encryption using blockchain,” IEEE Trans. Inform. Foren. and Sec., pp. 3227–3238, 2020. DOI: 10.1109/TIFS.2020.2973864
|
[10] |
J. Poon and T. Dryja, “The bitcoin lightning network: Scalable off-chain instant payments,” [Online] Available: https://lightning.network/lightning-network-paper.pdf, 2016.
|
[11] |
D. Zhang, J. Le, N. Mu, and X. Liao, “An anonymous off-blockchain micropayments scheme for cryptocurrencies in the real world,” IEEE Trans. Systems,Man,and Cybernetics: Systems, vol. 50, no. 1, pp. 32–42, Jan. 2020.
|
[12] |
A. Miller, et al., “Sprites and state channels: Payment networks that go faster than lightning,” in Proc. Int. Conf. Financial Cryptography and Data Security, Sept. 2019, pp. 508–526.
|
[13] |
R. Khalil and A. Gervais, “Revive: Rebalancing off-blockchain payment networks,” in Proc. ACM SIGSAC Conf. Computer and Communications Security, Oct. 2017, pp. 439–453.
|
[14] |
C. Lin, D. He, X. Huang, M. Khan, and K. Choo, “DCAP: A secure and efficient decentralized conditional anonymous payment system based on blockchain,” IEEE Trans. Inform. Foren. and Sec, vol. 15, pp. 2440–2452, Feb. 2020. doi: 10.1109/TIFS.2020.2969565
|
[15] |
P. Prihodko, S. Zhigulin, M. Sahno, A. Ostrovskiy, and O. Osuntokun, “Flare: An approach to routing in lightning network,” [Online] Available: whitepaper_flare_an_approach_to_routing_in_lightning_network_7_7_2016, 2016.
|
[16] |
K. Chen and H. Shen, “DTN-FLOW: Inter-landmark data flow for high-throughput routing in DTNs,” IEEE/ACM Trans. on Networking, vol. 23, no. 1, pp. 212–226, Feb. 2015. doi: 10.1109/TNET.2013.2296751
|
[17] |
S. Thakur and J. G. Breslin, “Coordinated landmark-based routing for blockchain offline channels,” in Proc. 2nd Int. Conf. Blockchain Computing and Applications, Nov. 2020, pp. 108–114.
|
[18] |
M. Arcak and N. Martins, “Dissipativity tools for convergence to Nash equilibria in population games,” IEEE Trans. on Control of Network Systems, vol. 8, no. 1, pp. 39–50, Mar. 2021. doi: 10.1109/TCNS.2020.3029990
|
[19] |
S. Dziembowski, S. Faust, and K. Hostáková, “General state channel networks,” in Proc. ACM SIGSAC Conf. Computer and Communications Security, Jan. 2018, pp. 949–966.
|
[20] |
S. Wu, Y. Chen, Q. Wang, M. Li, C. Wang, and X. Luo, “CReam: A smart contract enabled collusion-resistant e-auction,” IEEE Trans. Inform. Foren. and Sec., vol. 14, no. 7, pp. 1687–1701, Mar. 2018.
|
[21] |
J. Spilman. “Anti DoS for tx replacement,” [Online] Available: https://lists.Linuxfoundation.org/pipermail/bitcoin-dev/2013-April/002433.html. 2013.
|
[22] |
X. Li, Y. Wang, P. Vijayakumar, D. He, and J. Ma, “Blockchain-based mutual-healing group key distribution scheme in unmanned aerial vehicles Ad-Hoc network,” IEEE Trans. Vehicular Technology, vol. 68, no. 11, pp. 11309–11322, Nov. 2019. doi: 10.1109/TVT.2019.2943118
|
[23] |
Y. Liu, M. Ma, X. Liu, N. Xiong, and Y. Zhu, “Design and analysis of probing route to defense sink-hole attacks for internet of things security,” IEEE Trans. Network Sci. and Eng., vol. 7, no. 1, pp. 356–372, Jan.–Mar. 2020. doi: 10.1109/TNSE.2018.2881152
|
[24] |
M. Karaliopoulos and E. Bakali, “Optimizing mobile crowdsensing platforms for boundedly rational users,” IEEE Trans. Mobile Computing, vol. 21, no. 4, pp. 1305–1318, Apr. 2022.
|
[25] |
M. Jiang, Z. Wang, L. Qiu, S. Guo, and K. Tan, “A fast dynamic evolutionary multiobjective algorithm via manifold transfer learning,” IEEE Trans. Cybernetics, vol. 51, no. 7, pp. 3417–3428, Jul. 2021.
|
[26] |
R. Qin, Y. Yuan, and F. Wang, “Research on the selection strategies of blockchain mining pools,” IEEE Trans. Computational Social Systems, vol. 5, no. 3, pp. 748–757, Aug. 2018. doi: 10.1109/TCSS.2018.2861423
|
[27] |
W. Dai, C. Dai, K. Choo, C. Cui, D. Zou, and H. Jin, “SDTE: A secure blockchain-based data trading ecosystem,” IEEE Trans. Inform. Foren. and Sec., vol. 15, pp. 725–737, Sept. 2020. doi: 10.1109/TIFS.2019.2928256
|
[28] |
H. Shi, S. Wang, Q. Hu, X. Cheng, J. Zhang, and J. Yu, “Fee-free pooled mining for countering pool-hopping attack in blockchain,” IEEE Trans. Dependable and Secure Computing, vol. 18, no. 4, pp. 1580–1590, Jul./Aug. 2021.
|
[29] |
P. Zhang and M. Zhou, “Security and trust in blockchains: Architecture, key technologies, and open issues,” IEEE Trans. Computational Social Systems, vol. 7, no. 3, pp. 790–801, Jun. 2020. doi: 10.1109/TCSS.2020.2990103
|
[30] |
A. Asheralieva, T. Quek, and D. Niyato, “An asymmetric evolutionary Bayesian coalition formation game for distributed resource sharing in a multi-cell device-to-device enabled cellular network,” IEEE Trans. Wireless Communications, vol. 17, no. 6, pp. 3752–3767, Jun. 2018. doi: 10.1109/TWC.2018.2815628
|
[31] |
M. Chica, R. Chiong, M. Kirley, and H. Ishibuchi, “A networked N-player trust game and its evolutionary dynamics,” IEEE Trans. Evolutionary Computation, vol. 22, no. 6, pp. 866–878, Dec. 2018. doi: 10.1109/TEVC.2017.2769081
|
[32] |
P. Semasinghe, E. Hossain, and K. Zhu, “An evolutionary game for distributed resource allocation in self-organizing small cells,” IEEE Trans. Mobile Computing, vol. 14, no. 2, pp. 274–287, Dec. 2015. doi: 10.1109/TMC.2014.2318700
|
[33] |
Y. Zhang and D. Yang, “RobustPay+: Robust payment routing with approximation guarantee in blockchain-based payment channel networks,” IEEE/ACM Trans. Networking, vol. 29, no. 4, pp. 1676–1686, Aug. 2021.
|
[34] |
C. Chen, X. Chen, J. Yu, W. Wu, and D. Wu, “Impact of temporary fork on the evolution of mining pools in blockchain networks: An evolutionary game analysis,” IEEE Trans. Network Sci. and Eng., vol. 8, no. 1, pp. 400–418, Jan.–Mar. 2021.
|
[35] |
S. Li, M. Zhou, X. Luo, and Z. You, “Distributed winner-take-all in dynamic networks,” IEEE Trans. Automatic Control, vol. 62, no. 2, pp. 577–589, Jan. 2017. doi: 10.1109/TAC.2016.2578645
|
[36] |
Z. Liu, S. Mei, S. Yao, W. Yuan, and H. Hua, “Existence and stability of equilibrium of DC microgrid with constant power loads,” IEEE Trans. Power Syst., vol. 33, no. 6, pp. 6999–7010, Oct. 2018. doi: 10.1109/TPWRS.2018.2849974
|
[37] |
T. Shigekuni and T. Takimoto, “Stabilization of uncertain equilibrium points by dynamic state-derivative feedback control,” in Proc. 13th Int. Conf. Control, Automat. and Syst., Oct. 2013, pp. 23–27.
|
[38] |
N. Baron, et al., “On the false positives and false negatives of the Jacobian matrix in kinematically redundant parallel mechanisms,” IEEE Trans. Robot., vol. 36, no. 3, pp. 951–958, Feb. 2020. doi: 10.1109/TRO.2020.2966401
|
[39] |
P. Zhang, C. Li, and M. Zhou, “Supplementary file,” [Online] Available: https://www.dropbox.com/s/kdms1g4tjugy6ag/Blockchain-channel-network-2021.pdf?dl=0 Or https://1drv.ms/b/s!Avoj112p4TjyrmII_kTQcHPI1d9d?e=9gv5ud, 2021.
|
[40] |
D. Cheng, T. Xu, and H. Qi, “Evolutionarily stable strategy of networked evolutionary games,” IEEE Trans. Neural Networks and Learning Systems, vol. 25, no. 7, pp. 1335–1345, Jun. 2014. doi: 10.1109/TNNLS.2013.2293149
|
[41] |
D. Said, “A decentralized electricity trading framework (DETF) for connected EVs: A blockchain and machine learning for profit margin optimization,” IEEE Trans. Ind. Inform., vol. 17, no. 10, pp. 6594–6602, Oct. 2021.
|
[42] |
A. Keränen, J. Ott, and T. Kärkkäinen, “The ONE simulator for DTN protocol evaluation,” in Proc. 2nd Int. Conf. Simulation Tools and Techniques, 2009, p. 55.
|
[43] |
C. Sommer, R. German, and F. Dressler, “Bidirectionally coupled network and road traffic simulation for improved IVC analysis,” IEEE Trans. Mobile Computing, vol. 10, no. 1, pp. 3–15, Jan. 2011. doi: 10.1109/TMC.2010.133
|
[44] |
S. Eshghi, M. Khouzani, S. Sarkar. N. Shroff, and S. Venkatesh, “Optimal energy-aware epidemic routing in DTNs,” IEEE Trans. Automatic Control, vol. 60, no. 6, pp. 1554–1569, May 2015. doi: 10.1109/TAC.2015.2396641
|
[45] |
L. Xue, C. Sun, D. Wunsch, Y. Zhou, and F. Yu, “An adaptive strategy via reinforcement learning for the prisoner’s dilemma game,” IEEE/CAA J. Autom. Sinica, vol. 5, no. 1, pp. 301–310, Jan. 2018. doi: 10.1109/JAS.2017.7510466
|
[46] |
G. Zhao, Y. Wang, and H. Li, “A matrix approach to the modeling and analysis of networked evolutionary games with time delays,” IEEE/CAA J. Autom. Sinica, vol. 5, no. 4, pp. 818–826, Jul. 2018. doi: 10.1109/JAS.2016.7510259
|
[47] |
P. Zhang, et al., “A performance-optimized consensus mechanism for consortium blockchains consisting of trust-varying nodes,” IEEE Trans. Network Science and Engineering, vol. 8, no. 3, pp. 2147–2159, Jul.–Sept. 2021.
|
[48] |
S. Dustdar, P. Fernández, J. M. García, and A. Ruiz-Cortés, “Elastic smart contracts in blockchains,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 12, pp. 1901–1912, Dec. 2021. doi: 10.1109/JAS.2021.1004222
|
[49] |
S. K. Dwivedi, et al., “Blockchain-based secured IPFS-enable event storage technique with authentication protocol in VANET,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 12, pp. 1913–1922, Dec. 2021. doi: 10.1109/JAS.2021.1004225
|
[50] |
D. L. Xu, W. Shi, W. S. Zhai, and Z. H. Tian, “Multi-candidate voting model based on blockchain,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 12, pp. 1891–1900, Dec. 2021.
|
[51] |
Mamta, B. B. Gupta, K.-C. Li, V. C. M. Leung, K. E. Psannis, and S. Yamaguchi, “Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 12, pp. 1877–1890, Dec. 2021.
|
[52] |
M. M. Hassan, G. Fortino, L. T. Yang, H. Jiang, K.-K. R. Choo, J. Zhang, and F.-Y. Wang, “Guest editorial for special issue on blockchain for Internet-of-Things and cyber-physical systems,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 12, pp. 1867, Dec. 2021.
|
[53] |
G. Fortino, C. Savaglio, G. Spezzano, and M. C. Zhou, “Internet of Things as system of systems: A review of methodologies, frameworks, platforms and tools,” IEEE Trans. Systems,Man,and Cybernetics: Systems, vol. 51, no. 1, pp. 223–236, Jan. 2021.
|
[54] |
Z. Tan, C. Wang, C. G. Yan, M. C. Zhou, and C. J. Jiang, “Protecting privacy of location-based services in road networks,” IEEE Trans. Intelligent Transportation Systems, vol. 22, no. 10, pp. 6435–6448, Oct. 2021.
|
[55] |
Y. Xie, G. J. Liu, C. G. Yan, C. J. Jiang, and M. C. Zhou, “Time-aware attention-based gated network for credit card fraud detection by extracting transactional behaviors,” IEEE Trans. Computational Social Systems, DOI: 10.1109/TCSS.2022.3158318, 2022.
|
[56] |
C. Liu, Q. T. Zeng, L. Cheng, H. Duan, M. C. Zhou, and J. J. Cheng, “Privacy-preserving behavioral correctness verification of cross-organizational workflow with task synchronization patterns,” IEEE Trans. Automation Science and Engineering, vol. 18, no. 3, pp. 1037–1048, Jul. 2021.
|
[57] |
S. Deng, Z. Xiang, P. Zhao, J. Taheri, H. Gao, J. Yin, and A. Y. Zomaya, “Dynamical resource allocation in edge for trustable internet-of-things systems: A reinforcement learning method,” IEEE Trans. Ind. Informatics, vol. 16, no. 9, pp. 6103–6113, 2020.
|
[58] |
P. Y. Zhang, M. C. Zhou, and G. Fortino, “Security and trust issues in fog computing: A survey,” Future Generation Computer Systems, vol. 88, pp. 16–27, Nov. 2018.
|
[59] |
H. Zhu and M. Zhou, “Role-based collaboration and its kernel mechanisms,” IEEE Trans. Systems, Man and Cybernetics, Part C, vol. 36, no. 4, pp. 578–589, Jul. 2006.
|