Table 3 Attack capabilities and success probabilities in centralized versus BDEQ architecture.
From: Enhancing secure IoT data sharing through dynamic Q-learning and blockchain at the edge
Items | Capability (scenario 1) | Probability (scenario 1) | Capability (scenario 2) | Probability (scenario 2) |
|---|---|---|---|---|
Pre-transmission | Hack into n nodes | \(\mathop \prod \limits_{i = 1}^{N} \lambda_{i}\) | Hack into n DS-PSPNs | \(\left( {1 - \mathop \prod \limits_{i = 1}^{N} t_{i} } \right)\mathop \prod \limits_{i = 1}^{N} \lambda_{i}^{\prime }\) |
In-transit | Hack n channels | \(\mathop \prod \limits_{i = 1}^{N} \eta_{i}\) | Forge authorization | \(\left( {1 - \mathop \prod \limits_{i = 1}^{N} t_{i} } \right)\mathop \prod \limits_{i = 1}^{N} \varepsilon^{\prime }_{i} \times \mathop \prod \limits_{i = 1}^{N} \lambda^{\prime }_{i}\) |
Post-reception | Hack into the control center | µ | Hack into N record pool | \(\left( {1 - \mathop \prod \limits_{i = 1}^{N} t_{i} } \right)\mathop \prod \limits_{i = 1}^{N} \varepsilon^{\prime }_{i} \times \mathop \prod \limits_{i = 1}^{N} \eta^{\prime }_{i}\) |