DQN-Raft+: A Deep Reinforcement Learning-Optimized Lightweight Consensus Algorithm for Secure Edge Storage in IoT Environments
Abstract
The rapid development of the Internet of Things (IoT) has intensified security and privacy challenges across data generation, transmission, and storage. This study introduces a blockchain-based secure edge storage model tailored for IoT environments and presents a lightweight consensus algorithm, Deep Q-Network (DQN)-Raft+, which incorporates deep reinforcement learning. By combining the decentralized features of edge computing and blockchain, the model enables automated data access control through smart contracts. Furthermore, it optimizes leader node selection in the Raft consensus process using a DQN, formulating the consensus as a Markov Decision Process to enhance responsiveness and privacy protection in dynamic network conditions. Experiments were performed in a simulated environment using TensorFlow 2.6 and a MySQL database. The performance of DQN-Raft+ was compared against traditional consensus algorithms, including Proof of Work, Proof of Stake, Practical Byzantine Fault Tolerance, and Delegated Byzantine Fault Tolerance. Results indicate that DQN-Raft+ significantly reduces block generation delay (175.77 ms) and achieves a high privacy protection score (0.95). It also maintains a low data loss rate of 0.01%, demonstrating enhanced robustness and real-time capability. These findings indicate that DQN-Raft+ effectively strengthens data security and privacy in IoT systems, offering a technically sound and efficient mechanism for secure data exchange. The study provides both a theoretical framework and practical direction for future research in secure IoT deployment.References
Mu X, Antwi-Afari M F. The applications of Internet of Things (IoT) in industrial management: a science mapping review. International Journal of Production Research, 2024, 62(5): 1928-1952.
Qamar R, Zardari B A. A study of blockchain-based internet of things. Iraqi Journal for Computer Science and Mathematics, 2023, 4(1): 15-23.
Jawad L A. Security and privacy in digital healthcare systems: Challenges and mitigation strategies. Abhigyan, 2024, 42(1): 23-31.
Sharma A K, Peelam M S, Chauasia B K, et al. QIoTChain: quantum IoT-blockchain fusion for advanced data protection in Industry 4.0. IET Blockchain, 2024, 4(3): 252-262.
Ray R K, Chowdhury F R, Hasan M D R. Blockchain applications in retail cybersecurity: enhancing supply chain integrity, secure transactions, and data protection. Journal of Business and Management Studies, 2024, 6(1): 206-214.
Al Asqah M, Moulahi T. Federated learning and blockchain integration for privacy protection in the internet of things: Challenges and solutions. Future Internet, 2023, 15(6): 203.
Frimpong S A, Han M, Boahen E K, et al. RecGuard: An efficient privacy preservation blockchain-based system for online social network users. Blockchain: Research and Applications, 2023, 4(1): 100111.
Xie Q, Jiang S, Jiang L, et al. Efficiency optimization techniques in privacy-preserving federated learning with homomorphic encryption: A brief survey. IEEE Internet of Things Journal, 2024, 11(14): 24569-24580.
Kua J, Hossain M B, Natgunanathan I, et al. Privacy preservation in smart meters: current status, challenges and future directions. Sensors, 2023, 23(7): 3697.
Khan A A, Por L Y. Special issue on information security and cryptography: The role of advanced digital technology. Applied Sciences, 2024, 14(5): 2045.
Ortiz I. Integrating advanced data handling approaches in modern architectural designs to optimize efficiency and scalability. Journal of Sustainable Technologies and Infrastructure Planning, 2023, 7(1): 97-134.
Dwivedi S K, Amin R, Vollala S. Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment. Peer-to-Peer Networking and Applications, 2023, 16(1): 1-21.
Cao Y N, Wang Y, Ding Y, et al. Blockchain-empowered security and privacy protection technologies for smart grid. Computer Standards & Interfaces, 2023, 85(1): 103708.
Wen B, Wang Y, Ding Y, et al. Security and privacy protection technologies in securing blockchain applications. Information Sciences, 2023, 645(1): 119322.
Chen Q, Li D, Wang L. Blockchain Technology for enhancing network security. Journal of Industrial Engineering and Applied Science, 2024, 2(4): 22-28.
Ren Y, Huang D, Wang W, et al. BSMD: A blockchain-based secure storage mechanism for big spatio-temporal data. Future Generation Computer Systems, 2023, 138(1): 328-338.
Emami A, Keshavarz Kalhori G, Mirzakhani S, et al. A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach. The Journal of Supercomputing, 2024, 80(6): 7507-7556.
Rodríguez E, Otero B, Canal R. A survey of machine and deep learning methods for privacy protection in the internet of things. Sensors, 2023, 23(3): 1252.
Valencia-Arias A, González-Ruiz J D, Verde Flores L, et al. Machine learning and blockchain: a bibliometric study on security and privacy. Information, 2024, 15(1): 65.
Li X, Zhao H, Feng Y, et al. Research on key technologies of high energy efficiency and low power consumption of new data acquisition equipment of power Internet of Things based on artificial intelligence. International Journal of Thermofluids, 2024, 21(1): 100575.
Khalid W, Jamil M, Khan A A, et al. Open-source internet of things-based supervisory control and data acquisition system for photovoltaic monitoring and control using HTTP and TCP/IP protocols. Energies, 2024, 17(16): 4083.
Zhaisanova D, Mansurova M. Blockchain concept for the educational purposes: bibliometric analysis and conceptual structure. Procedia Computer Science, 2024, 231(1): 753-758.
Lin D. Exploring the economic logic of the application scenario of blockchain technology-Analysis based on the perspective of information economics. Information Systems and Economics, 2024, 5(3): 9-14.
Mahajan H, Reddy K T V. Secure gene profile data processing using lightweight cryptography and blockchain. Cluster Computing, 2024, 27(3): 2785-2803.
Hagui I, Msolli A, ben Henda N, et al. A blockchain-based security system with light cryptography for user authentication security. Multimedia Tools and Applications, 2024, 83(17): 52451-52480.
Shi D, Xu H, Wang S, et al. Deep reinforcement learning based adaptive energy management for plug-in hybrid electric vehicle with double deep Q-network. Energy, 2024, 305(1): 132402.
Zhou Y, Ren Y, Xu M, et al. An improved NSGA-III algorithm based on deep Q-networks for cloud storage optimization of blockchain. IEEE Transactions on Parallel and Distributed Systems, 2023, 34(5): 1406-1419.
Moghaddasi K, Masdari M. Blockchain-driven optimization of IoT in mobile edge computing environment with deep reinforcement learning and multi-criteria decision-making techniques. Cluster Computing, 2024, 27(4): 4385-4413.
Yun J, Jiang D, Huang L, et al. Grasping detection of dual manipulators based on Markov decision process with neural network. Neural Networks, 2024, 169(1): 778-792.
Li T, Guan Z, Zou S, et al. Faster algorithm and sharper analysis for constrained Markov decision process. Operations Research Letters, 2024, 54(1): 107107.
DOI:
https://doi.org/10.31449/inf.v49i33.8909Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







