首页 > 最新文献

High-Confidence Computing最新文献

英文 中文
H-hop independently submodular maximization problem with curvature 有曲率的 H 跳独立亚模态最大化问题
Pub Date : 2024-02-02 DOI: 10.1016/j.hcc.2024.100208
Yang Lv , Chenchen Wu , Dachuan Xu , Ruiqi Yang

The Connected Sensor Problem (CSP) presents a prevalent challenge in the realms of communication and Internet of Things (IoT) applications. Its primary aim is to maximize the coverage of users while maintaining connectivity among K sensors. Addressing the challenge of managing a large user base alongside a finite number of candidate locations, this paper proposes an extension to the CSP: the h-hop independently submodular maximization problem characterized by curvature α. We have developed an approximation algorithm that achieves a ratio of 1eα(2h+3)α. The efficacy of this algorithm is demonstrated on the CSP, where it shows superior performance over existing algorithms, marked by an average enhancement of 8.4%.

互联传感器问题(CSP)是通信和物联网(IoT)应用领域的一个普遍挑战。其主要目的是最大限度地扩大用户覆盖范围,同时保持 K 个传感器之间的连接。为了应对在有限的候选位置中管理庞大用户群的挑战,本文提出了 CSP 的扩展:以曲率 α 为特征的 h 跳独立亚模块最大化问题。我们在 CSP 上证明了这种算法的有效性,它比现有算法表现出更优越的性能,平均提高了 8.4%。
{"title":"H-hop independently submodular maximization problem with curvature","authors":"Yang Lv ,&nbsp;Chenchen Wu ,&nbsp;Dachuan Xu ,&nbsp;Ruiqi Yang","doi":"10.1016/j.hcc.2024.100208","DOIUrl":"10.1016/j.hcc.2024.100208","url":null,"abstract":"<div><p>The Connected Sensor Problem (CSP) presents a prevalent challenge in the realms of communication and Internet of Things (IoT) applications. Its primary aim is to maximize the coverage of users while maintaining connectivity among <em>K</em> sensors. Addressing the challenge of managing a large user base alongside a finite number of candidate locations, this paper proposes an extension to the CSP: the h-hop independently submodular maximization problem characterized by curvature <span><math><mi>α</mi></math></span>. We have developed an approximation algorithm that achieves a ratio of <span><math><mfrac><mrow><mn>1</mn><mo>−</mo><msup><mrow><mi>e</mi></mrow><mrow><mo>−</mo><mi>α</mi></mrow></msup></mrow><mrow><mrow><mo>(</mo><mn>2</mn><mi>h</mi><mo>+</mo><mn>3</mn><mo>)</mo></mrow><mi>α</mi></mrow></mfrac></math></span>. The efficacy of this algorithm is demonstrated on the CSP, where it shows superior performance over existing algorithms, marked by an average enhancement of 8.4%.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000114/pdfft?md5=6545def2e75a2c91befd56e66f41423d&pid=1-s2.0-S2667295224000114-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139818439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An investigation of the private-attribute leakage in WiFi sensing 对 WiFi 传感中私人属性泄露的调查
Pub Date : 2024-02-01 DOI: 10.1016/j.hcc.2024.100209
Yiding Shi, Xueying Zhang, Lei Fu, Huanle Zhang
{"title":"An investigation of the private-attribute leakage in WiFi sensing","authors":"Yiding Shi, Xueying Zhang, Lei Fu, Huanle Zhang","doi":"10.1016/j.hcc.2024.100209","DOIUrl":"https://doi.org/10.1016/j.hcc.2024.100209","url":null,"abstract":"","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139877677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bioinvasion risk analysis based on automatic identification system and marine ecoregion data 基于自动识别系统和海洋生态区数据的生物入侵风险分析
Pub Date : 2024-02-01 DOI: 10.1016/j.hcc.2024.100210
Hongwei Shi, Chenyu Wang, Hang Zhao, Shengling Wang, Yixian Chen
{"title":"Bioinvasion risk analysis based on automatic identification system and marine ecoregion data","authors":"Hongwei Shi, Chenyu Wang, Hang Zhao, Shengling Wang, Yixian Chen","doi":"10.1016/j.hcc.2024.100210","DOIUrl":"https://doi.org/10.1016/j.hcc.2024.100210","url":null,"abstract":"","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139876763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
H-hop independently submodular maximization problem with curvature 有曲率的 H 跳独立亚模态最大化问题
Pub Date : 2024-02-01 DOI: 10.1016/j.hcc.2024.100208
Yang Lv, Chenchen Wu, Dachuan Xu, Ruiqi Yang
{"title":"H-hop independently submodular maximization problem with curvature","authors":"Yang Lv, Chenchen Wu, Dachuan Xu, Ruiqi Yang","doi":"10.1016/j.hcc.2024.100208","DOIUrl":"https://doi.org/10.1016/j.hcc.2024.100208","url":null,"abstract":"","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139878330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting key topics from massive COVID-19 information on social networks: An integrated deep learning and LDA framework 从社交网络的海量 COVID-19 信息中提取关键主题:深度学习与 LDA 集成框架
Pub Date : 2024-02-01 DOI: 10.1016/j.hcc.2024.100213
Dan Li, Zhuoran Bi, Xiaoshuai Han, Zheng Qu, Chen Lyu
{"title":"Extracting key topics from massive COVID-19 information on social networks: An integrated deep learning and LDA framework","authors":"Dan Li, Zhuoran Bi, Xiaoshuai Han, Zheng Qu, Chen Lyu","doi":"10.1016/j.hcc.2024.100213","DOIUrl":"https://doi.org/10.1016/j.hcc.2024.100213","url":null,"abstract":"","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140467465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bioinvasion risk analysis based on automatic identification system and marine ecoregion data 基于自动识别系统和海洋生态区数据的生物入侵风险分析
Pub Date : 2024-02-01 DOI: 10.1016/j.hcc.2024.100210
Hongwei Shi, Chenyu Wang, Hang Zhao, Shengling Wang, Yixian Chen
{"title":"Bioinvasion risk analysis based on automatic identification system and marine ecoregion data","authors":"Hongwei Shi, Chenyu Wang, Hang Zhao, Shengling Wang, Yixian Chen","doi":"10.1016/j.hcc.2024.100210","DOIUrl":"https://doi.org/10.1016/j.hcc.2024.100210","url":null,"abstract":"","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139816780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic anomaly detection algorithm for CAN bus using similarity analysis 使用相似性分析的 CAN 总线流量异常检测算法
IF 3.2 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-24 DOI: 10.1016/j.hcc.2024.100207

Recently, vehicles have experienced a rise in networking and informatization, leading to increased security concerns. As the most widely used automotive bus network, the Controller Area Network (CAN) bus is vulnerable to attacks, as security was not considered in its original design. This paper proposes SIDuBzip2, a traffic anomaly detection method for the CAN bus based on the bzip2 compression algorithm. The proposed method utilizes the pseudo-periodic characteristics of CAN bus traffic, constructing time series of CAN IDs and calculating the similarity between adjacent time series to identify abnormal traffic. The method consists of three parts: the conversion of CAN ID values to characters, the calculation of similarity based on bzip2 compression, and the optimal solution of model parameters. The experimental results demonstrate that the proposed SIDuBzip2 method effectively detects various attacks, including Denial of Service , replay, basic injection, mixed injection, and suppression attacks. In addition, existing CAN bus traffic anomaly detection methods are compared with the proposed method in terms of performance and delay, demonstrating the feasibility of the proposed method.

近来,汽车网络化和信息化程度不断提高,导致安全问题日益突出。作为应用最广泛的汽车总线网络,控制器局域网(CAN)总线在最初设计时并没有考虑到安全问题,因此很容易受到攻击。本文提出了一种基于 bzip2 压缩算法的 CAN 总线流量异常检测方法 SIDuBzip2。该方法利用 CAN 总线流量的伪周期特性,构建 CAN ID 的时间序列,并计算相邻时间序列之间的相似性,从而识别异常流量。该方法由三部分组成:CAN ID 值到字符的转换、基于 bzip2 压缩的相似性计算以及模型参数的最优解。实验结果表明,所提出的 SIDuBzip2 方法能有效检测出各种攻击,包括拒绝服务攻击、重放攻击、基本注入攻击、混合注入攻击和抑制攻击。此外,还将现有的 CAN 总线流量异常检测方法与所提出的方法在性能和延迟方面进行了比较,证明了所提出方法的可行性。
{"title":"Traffic anomaly detection algorithm for CAN bus using similarity analysis","authors":"","doi":"10.1016/j.hcc.2024.100207","DOIUrl":"10.1016/j.hcc.2024.100207","url":null,"abstract":"<div><p>Recently, vehicles have experienced a rise in networking and informatization, leading to increased security concerns. As the most widely used automotive bus network, the Controller Area Network (CAN) bus is vulnerable to attacks, as security was not considered in its original design. This paper proposes SIDuBzip2, a traffic anomaly detection method for the CAN bus based on the bzip2 compression algorithm. The proposed method utilizes the pseudo-periodic characteristics of CAN bus traffic, constructing time series of CAN IDs and calculating the similarity between adjacent time series to identify abnormal traffic. The method consists of three parts: the conversion of CAN ID values to characters, the calculation of similarity based on bzip2 compression, and the optimal solution of model parameters. The experimental results demonstrate that the proposed SIDuBzip2 method effectively detects various attacks, including Denial of Service , replay, basic injection, mixed injection, and suppression attacks. In addition, existing CAN bus traffic anomaly detection methods are compared with the proposed method in terms of performance and delay, demonstrating the feasibility of the proposed method.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":3.2,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000102/pdfft?md5=b2ff302140dd063117041177fe6d1399&pid=1-s2.0-S2667295224000102-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure blockchain bidding auction protocol against malicious adversaries 抵御恶意对手的安全区块链竞价拍卖协议
Pub Date : 2024-01-11 DOI: 10.1016/j.hcc.2024.100201
Xiaobing Dai , Jiajing Liu , Xin Liu , Xiaofen Tu , Ruexue Wang

In recent years, with the development of blockchain, electronic bidding auction has received more and more attention. Aiming at the possible problems of privacy leakage in the current electronic bidding and auction, this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries, which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party. The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography. It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants, which can solve the problem of resisting malicious adversary attacks. The security of the protocol is proved by the real/ideal model paradigm, and the efficiency of the protocol is analyzed. The efficiency of the protocol is verified by simulating experiments, and the protocol has practical value.

近年来,随着区块链的发展,电子竞价拍卖受到越来越多的关注。针对目前电子竞价拍卖中可能存在的隐私泄露问题,本文提出了一种基于区块链的对抗恶意对手的电子竞价拍卖系统,利用安全多方计算实现无可信第三方的安全竞价拍卖协议。本文提出的协议是一种基于阈值椭圆曲线密码学的电子竞价拍卖方案。它可以在没有任何第三方的情况下,针对参与者的一些恶意行为完成竞价拍卖,解决了抵御恶意对手攻击的问题。通过真实/理想模型范式证明了协议的安全性,并分析了协议的效率。通过模拟实验验证了协议的效率,协议具有实用价值。
{"title":"Secure blockchain bidding auction protocol against malicious adversaries","authors":"Xiaobing Dai ,&nbsp;Jiajing Liu ,&nbsp;Xin Liu ,&nbsp;Xiaofen Tu ,&nbsp;Ruexue Wang","doi":"10.1016/j.hcc.2024.100201","DOIUrl":"10.1016/j.hcc.2024.100201","url":null,"abstract":"<div><p>In recent years, with the development of blockchain, electronic bidding auction has received more and more attention. Aiming at the possible problems of privacy leakage in the current electronic bidding and auction, this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries, which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party. The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography. It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants, which can solve the problem of resisting malicious adversary attacks. The security of the protocol is proved by the real/ideal model paradigm, and the efficiency of the protocol is analyzed. The efficiency of the protocol is verified by simulating experiments, and the protocol has practical value.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000047/pdfft?md5=319168477025da7fd78f5308eb341778&pid=1-s2.0-S2667295224000047-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139635497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cognitive spectrum allocation scheme for data transmission in smart distribution grids 用于智能配电网数据传输的认知频谱分配方案
Pub Date : 2024-01-11 DOI: 10.1016/j.hcc.2024.100198
Zhongguo Zhou , You Li , Ziming Zhu , Qinghe Gao , Sisi Xiao , Tao Yan , Yan Huo

As the communication needs in the smart distribution grid continue to rise, using existing resources to meet this growing demand poses a significant challenge. This paper researches on spectrum allocation strategies utilizing cognitive radio (CR) technology. We consider a model containing strong time-sensitive and regular communication service requirements such as distribution terminal communication services, which can be seen as a user with primary data (PD) and weak time-sensitive services such as power quality monitoring, which can be seen as a user with secondary data (SD). To fit the diversity of services in smart distribution grids (SDGs), we formulate an optimization problem with two indicators, including the sum of SD transmission rates and the maximum latency of them. Then, we analyze the two convex sub-problems and utilize convex optimization methods to obtain the optimal power and frequency bandwidth allocation for the users with SD. The simulation results indicate that, when the available transmission power of SD is low, Maximization of Transmission Sum Rate (MTSR) achieves lower maximum transmit time. Conversely, when the available transmission power is high, the performance of Minimization of the Maximum Latency (MML) is better, compared with MTSR.

随着智能配电网的通信需求不断增加,如何利用现有资源满足日益增长的需求成为一项重大挑战。本文研究了利用认知无线电(CR)技术的频谱分配策略。我们考虑了一个包含强时间敏感性和常规通信服务需求的模型,如配电终端通信服务,它可以被看作是拥有一次数据(PD)的用户,以及弱时间敏感性服务,如电能质量监测,它可以被看作是拥有二次数据(SD)的用户。为了适应智能配电网(SDGs)中服务的多样性,我们提出了一个优化问题,其中包含两个指标,包括 SD 传输速率之和及其最大延迟。然后,我们分析了这两个凸子问题,并利用凸优化方法获得了标清用户的最优功率和频率带宽分配。仿真结果表明,当 SD 的可用传输功率较低时,最大化传输总和速率(MTSR)能获得较低的最大传输时间。相反,当可用传输功率较高时,最大延迟最小化(MML)与 MTSR 相比性能更好。
{"title":"A cognitive spectrum allocation scheme for data transmission in smart distribution grids","authors":"Zhongguo Zhou ,&nbsp;You Li ,&nbsp;Ziming Zhu ,&nbsp;Qinghe Gao ,&nbsp;Sisi Xiao ,&nbsp;Tao Yan ,&nbsp;Yan Huo","doi":"10.1016/j.hcc.2024.100198","DOIUrl":"10.1016/j.hcc.2024.100198","url":null,"abstract":"<div><p>As the communication needs in the smart distribution grid continue to rise, using existing resources to meet this growing demand poses a significant challenge. This paper researches on spectrum allocation strategies utilizing cognitive radio (CR) technology. We consider a model containing strong time-sensitive and regular communication service requirements such as distribution terminal communication services, which can be seen as a user with primary data (PD) and weak time-sensitive services such as power quality monitoring, which can be seen as a user with secondary data (SD). To fit the diversity of services in smart distribution grids (SDGs), we formulate an optimization problem with two indicators, including the sum of SD transmission rates and the maximum latency of them. Then, we analyze the two convex sub-problems and utilize convex optimization methods to obtain the optimal power and frequency bandwidth allocation for the users with SD. The simulation results indicate that, when the available transmission power of SD is low, <em>Maximization of Transmission Sum Rate</em> (MTSR) achieves lower maximum transmit time. Conversely, when the available transmission power is high, the performance of <em>Minimization of the Maximum Latency</em> (MML) is better, compared with MTSR.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000011/pdfft?md5=1b5e9cb9577d5d4bd670a7738919fe96&pid=1-s2.0-S2667295224000011-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139632186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of fault tolerant consensus in wireless networks 无线网络容错共识调查
Pub Date : 2024-01-09 DOI: 10.1016/j.hcc.2024.100202
Yifei Zou , Li Yang , Guanlin Jing , Ruirui Zhang , Zhenzhen Xie , Huiqun Li , Dongxiao Yu

Wireless networks have become integral to modern communication systems, enabling the seamless exchange of information across a myriad of applications. However, the inherent characteristics of wireless channels, such as fading, interference, and openness, pose significant challenges to achieving fault-tolerant consensus within these networks. Fault-tolerant consensus, a critical aspect of distributed systems, ensures that network nodes collectively agree on a consistent value even in the presence of faulty or compromised components. This survey paper provides a comprehensive overview of fault-tolerant consensus mechanisms specifically tailored for wireless networks. We explore the diverse range of consensus protocols and techniques that have been developed to address the unique challenges of wireless environments. The paper systematically categorizes these consensus mechanisms based on their underlying principles, communication models, and fault models. It investigates how these mechanisms handle various types of faults, including communication errors, node failures, and malicious attacks. It highlights key use cases, such as sensor networks, Internet of Things (IoT) applications, wireless blockchain, and vehicular networks, where fault-tolerant consensus plays a pivotal role in ensuring reliable and accurate data dissemination.

无线网络已成为现代通信系统中不可或缺的一部分,可在无数应用中实现信息的无缝交换。然而,无线信道的固有特性,如衰减、干扰和开放性,给在这些网络中实现容错共识带来了巨大挑战。容错共识是分布式系统的一个重要方面,它能确保网络节点即使在组件出现故障或受损的情况下,也能就一致的值达成集体共识。本调查报告全面概述了专为无线网络量身定制的容错共识机制。我们探讨了为应对无线环境的独特挑战而开发的各种共识协议和技术。本文根据这些共识机制的基本原理、通信模型和故障模型对其进行了系统分类。它研究了这些机制如何处理各种类型的故障,包括通信错误、节点故障和恶意攻击。论文重点介绍了传感器网络、物联网(IoT)应用、无线区块链和车载网络等关键用例,在这些用例中,容错共识在确保数据传播的可靠性和准确性方面发挥着关键作用。
{"title":"A survey of fault tolerant consensus in wireless networks","authors":"Yifei Zou ,&nbsp;Li Yang ,&nbsp;Guanlin Jing ,&nbsp;Ruirui Zhang ,&nbsp;Zhenzhen Xie ,&nbsp;Huiqun Li ,&nbsp;Dongxiao Yu","doi":"10.1016/j.hcc.2024.100202","DOIUrl":"10.1016/j.hcc.2024.100202","url":null,"abstract":"<div><p>Wireless networks have become integral to modern communication systems, enabling the seamless exchange of information across a myriad of applications. However, the inherent characteristics of wireless channels, such as fading, interference, and openness, pose significant challenges to achieving fault-tolerant consensus within these networks. Fault-tolerant consensus, a critical aspect of distributed systems, ensures that network nodes collectively agree on a consistent value even in the presence of faulty or compromised components. This survey paper provides a comprehensive overview of fault-tolerant consensus mechanisms specifically tailored for wireless networks. We explore the diverse range of consensus protocols and techniques that have been developed to address the unique challenges of wireless environments. The paper systematically categorizes these consensus mechanisms based on their underlying principles, communication models, and fault models. It investigates how these mechanisms handle various types of faults, including communication errors, node failures, and malicious attacks. It highlights key use cases, such as sensor networks, Internet of Things (IoT) applications, wireless blockchain, and vehicular networks, where fault-tolerant consensus plays a pivotal role in ensuring reliable and accurate data dissemination.</p></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667295224000059/pdfft?md5=7d04cf1493be0e5575ab310a74881d83&pid=1-s2.0-S2667295224000059-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139457898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
High-Confidence Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1