共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
4.
Shadi Moazzeni Mohammad Reza Khayyambashi Naser Movahhedinia Franco Callegati 《International Journal of Communication Systems》2020,33(9)
This paper presents a method to improve the reliability and fault tolerance of distributed software‐defined networks. This method is called “BIRDSDN (Byzantine‐Resilient Improved Reliable Distributed Software‐Defined Networks).” In BIRDSDN, a group communication is implemented among the controllers of the whole clusters. This method can detect the crash failure and Byzantine failure of any controller and undertakes a fast detection and recovery scheme to select the controllers to take over the orphan switches. BIRDSDN takes into account the reliability of the nodes considering the failure probability of intracluster and intercluster links, topology, load, and latency. The numerical results show that this approach performs better than the other approaches regarding failure detection, recovery, latency, throughput, reliability, and packet loss. 相似文献
5.
In a cognitive radio ad hoc network, there is no central authority. Hence, distributed collaborative spectrum sensing (CSS) plays a major role in achieving an accurate spectrum sensing result. However, CSS is sensitive to spectrum sensing data falsification (SSDF) attack, in which a malicious user falsifies its local sensing report before disseminating it into the network. To capture such abnormal behavior of a node, we present an approach for detecting SSDF attack based on dissimilarity score. A secondary user (SU) computes the dissimilarity score of its neighbors from the messages received from its h‐hop neighbors. Further, we also present how the proposed scheme can be used on the sequence of sensing reports to detect and isolate the malicious SUs on the fly. 相似文献
6.
7.
通过模拟人群内部的信任和决策机制,针对多用户的频谱协作感知一致性问题,提出了一种分布式算法。该算法首先通过网络的历次协作过程预测出各感知用户的动态可信值,据此产生用户的相对可信值,并结合决策机制使得用户之间进行数据交互,随着数据的可信、迭代交互,所有用户状态将趋于一致,最后通过判定算法得出最终结果。算法充分考虑了实际环境中各用户频带感知能力的不平衡性,而且各次级用户只需要进行少量局部数据交换即可实现协作感知,与传统的OR-rule、1-out-of-N rule以及普通迭代法有较大区别。对3种数据篡改攻击进行了分析,并在预测算法的基础上提出了相应的安全策略。理论分析与仿真结果表明,新算法在准确性和安全性上均优于传统合作频谱感知算法,能显著提高频谱感知准确率,同时兼具较强的防攻击能力。 相似文献
8.
In order to deploy a blockchain on the non-continuous connectivity delay tolerant network,a blockchain trading mechanism was designed,which could run on this type of network.First,the identifier was introduced into the existing block structure and a block structure on the attached chain was presented,which could append the blocks generated during network disconnection.Then,the approaches including the block package,block mining and block consensus on the attached chain were proposed.Finally,a confirming consensus approach was presented to avoid block fraud in the process of appending the attached chain.Through theoretical proof and experimental analysis,the proposed mechanism can support blockchain trading in the delay tolerant network. 相似文献
9.
10.
区块链技术在物联网中的应用在很大程度上缓解了数据隐私、网络安全等现象,为了拓展区块链技术的应用,需要相关人员重视技术研究.本文阐述了区块链技术概述、区块链技术在物联网中的应用、针对物联网的区块链底层技术研究以及区块链为物联网带来的诸多挑战,希望能够促进区块链技术的应用,从而创造更大的效益. 相似文献
11.
In this study, a spatial spectrum method is proposed to cope with the pilot spoofing attack (PSA) problem by exploiting the of uplink–downlink channel reciprocity in time-division-duplex multiple-input multiple-output systems. First, the spoofing attack in the uplink stage is detected by a threshold derived from the predefined false alarm based on the estimated spatial spectrum. When the PSA occurs, the transmitter (That is Alice) can detect either one or two spatial spectrum peaks. Then, the legitimate user (That is Bob) and Eve are recognized in the downlink stage via the channel reciprocity property based on the difference between the spatial spectra if PSA occurs. This way, the presence of Eve and the direction of arrival of Eve and Bob can be identified at the transmitter end. Because noise is suppressed by a spatial spectrum, the detection performance is reliable even for low signal-noise ratios and a short training length. Consequently, Bob can use beamforming to transmit secure information during the data transmission stage. Theoretical analysis and numerical simulations are performed to evaluate the performance of the proposed scheme compared with conventional methods. 相似文献
12.
Internet of Things (IoT) is an internet of smart objects where smart objects communicate with each other. IoT objects are deployed in open medium with dynamic topology. Due lack of infrastructure and centralized management, IoT present serious vulnerabilities to security attacks. Therefore, security is an essential prerequisite for the real-world deployment of IoT. In this work, we propose reputation-based RPL protocol where reputation-based mechanism is embedded into RPL protocol to enhance its capabilities against selective forwarding attack. Reputation is calculated by evaluating data forwarding behavior of IoT node. Data forwarding behavior of IoT node is evaluated by the difference between monitored actual packet loss and estimated normal loss. Calculated reputation value is considered in parent selection. Simulation results show that the proposed approach can accurately detect and isolate selective forwarding attack with improving data delivery ratio of the IoT network. 相似文献
13.
14.
车联网异构节点由于其性能差异大、具有移动性等原因会造成区块链共识算法交易吞吐率低、交易时延较大等问题,该文提出面向车联网异构节点的区块链高效一致性共识算法(ECCA)。首先,在ECCA中,考虑由验证节点、一般节点和恶意节点组成的车联网异构节点,提出一种信用等级机制,实现信用等级划分和3类异构节点的划分。其次,提出一种跨区下的节点身份变更机制,及时调整当前区域内的节点身份。最后,提出一种改进的一致性共识算法,满足车联网的时效性需求。仿真结果表明:ECCA算法降低性能较差的一般节点和恶意节点对区块共识效率的影响,提高交易吞吐量,降低平均交易时延和平均节点通信开销。 相似文献
15.
Zainab Umair Kamangar Raheel Ahmed Memon Ghulam Murtaza Memon Umair Ayaz Kamangar 《International Journal of Communication Systems》2023,36(16):e5582
Healthcare is a vitally important field in the industry and evolving day by day in the aspect of technology, services, computing, and management. Its potential significance can be increased by incorporating Internet of Things (IoT) technology to make it smart in the aspect of automating activities, which is then further reformed in the healthcare domain with the help of blockchain technology. Blockchain technology provides many features to IoT-based healthcare domain applications such as restructuring by securing traditional practices, data management, data sharing, patient remote monitoring, and drug analysis. In this study, a systematic literature review has been carried out in which a total of 52 studies were selected to conduct systematic literature review from databases PubMed, IEEE Access, and Scopus; the study includes IoT technology and blockchain integration in healthcare domain-related application areas. This study also includes taxonomy that mentions the aspects and areas in healthcare domain incorporating the traditional system with the integration of IoT and blockchain to provide transparency, security, privacy, and immutability. This study also includes the incorporation of related sensors, platforms of blockchain, the objective focus of selected studies, and future directions by incorporating IoT and blockchain in healthcare domain. This study will help researchers who want to work with IoT and blockchain technology integration in healthcare domain. 相似文献
16.
云计算分布式缓存技术及其在物联网中的应用 总被引:1,自引:0,他引:1
物联网是信息技术发展到一定阶段的产物,而云计算平台是物联网应用的基础。文章从当前云计算应用所面临的问题和缺陷出发,介绍了云计算分布式缓存的部署方式、功能架构及关键技术,并说明了分布式缓存高性能、高吞吐、高可靠性、高扩展性等优势和特性。文章解决了物联网应用普遍面临的数据可靠性、大容量内存共享、多模块数据一致保障、线性扩容等难题,为物联网平台云化架构的底层支撑奠定了基础。 相似文献
17.
In the last few years, the number of devices operating in wireless Internet of Things (IoT) has experienced tremendous growth. On the other hand, the growth results in spectrum scarcity. Cognitive Radio (CR) systems have been proposed to efficiently exploit the spectra that have been assigned but are underutilized. In this paper, a spectrum sensing model based on Markov chain is proposed to predict the spectrum hole for CR in wireless IoT. Theoretical analysis and simulation results have been evaluated that a Markov model with two-state or four-state works well enough in wireless IoT whereas a model with more states is not necessary for it is complex. 相似文献
18.
19.
Internet of things ( IoT) can provide the function of product traceability for industrial systems. Emerging blockchain technology can solve the problem that the current industrial Internet of things ( IIoT) system lacks unified product data sharing services. Blockchain technology based on the directed acyclic graph (DAG) structure is more suitable for high concurrency environments. But due to its distributed architecture foundation, direct storage of product data will cause authentication problems in data management. In response, IIoT based on DAG blockchain is proposed in this paper, which can provide efficient data management for product data stored on DAG blockchain, and an authentication scheme suitable for this structure is given. The security of the scheme is based on a discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai and Wolf(LRSW) who also show that it holds for generic groups. The sequential aggregation signature scheme is more secure and efficient, and the new scheme is safe in theory and it is more efficient in engineering. 相似文献
20.
在本文中对继电保护装置的寿命进行分析,并且研究继电保护装置的寿命影响机理,以提升装置的使用年限. 相似文献