Blockchain-enabled electrical fault inspection and secure transmission in 5G smart grids
The maturity of the 5th-Generation (5G) communication technology promotes a new round of
industrial revolution and supports the high-quality development of economic society …
industrial revolution and supports the high-quality development of economic society …
New distributed consensus schemes with time delays and output saturation
L Jin, J Zhang, Y Qi, S Li - IEEE Transactions on Automation …, 2023 - ieeexplore.ieee.org
Estimates of agents in a distributed consensus control are aligned with a particular value
through interacting on communication graphs, which are of particular interest for researchers …
through interacting on communication graphs, which are of particular interest for researchers …
BCT: An efficient and fault tolerance blockchain consensus transform mechanism for IoT
J Fu, L Zhang, L Wang, F Li - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
With the vigorous development of 5G communication technology, massive Internet of Things
(IoT) devices generate data incrementally. Different data owners control different private …
(IoT) devices generate data incrementally. Different data owners control different private …
Practical Byzantine reliable broadcast on partially connected networks
In this paper, we consider the Byzantine reliable broadcast problem on authenticated and
partially connected networks. The state-of-the-art method to solve this problem consists in …
partially connected networks. The state-of-the-art method to solve this problem consists in …
Syncpcn/psyncpcn: Payment channel networks without blockchain synchrony
O Ersoy, J Decouchant, SP Kumble… - Proceedings of the 4th …, 2022 - dl.acm.org
Payment channel networks (PCNs) enhance the scalability of block-chains by allowing
parties to conduct transactions off-chain, ie, without broadcasting every transaction to all …
parties to conduct transactions off-chain, ie, without broadcasting every transaction to all …
Defense strategy selection model based on multistage evolutionary game theory
Evolutionary game theory is widely applied in network attack and defense. The existing
network attack and defense analysis methods based on evolutionary games adopt the …
network attack and defense analysis methods based on evolutionary games adopt the …
[HTML][HTML] Light-HIDRA: Scalable and decentralized resource orchestration in Fog-IoT environments
With the proliferation of Internet of Things (IoT) ecosystems, traditional resource
orchestration mechanisms, executed on fog devices, encounter significant scalability …
orchestration mechanisms, executed on fog devices, encounter significant scalability …
[PDF][PDF] TINYBFT: Byzantine Fault-Tolerant Replication for Highly Resource-Constrained Embedded Systems
Byzantine fault-tolerant (BFT) state-machine replication offers resilience against a wide
spectrum of faults including hardware crashes, software failures, and attacks. Unfortunately …
spectrum of faults including hardware crashes, software failures, and attacks. Unfortunately …
Intrusion resilience systems for modern vehicles
Current vehicular Intrusion Detection and Prevention Systems either incur high false-positive
rates or do not capture zero-day vulnerabilities, leading to safety-critical risks. In addition …
rates or do not capture zero-day vulnerabilities, leading to safety-critical risks. In addition …
Game theory approach for secured supply chain management in effective trade management
W Chu, Y Shi, X Jiang, T Ciano, B Zhao - Annals of Operations Research, 2024 - Springer
In the current digital era, trade management faces complexities and challenges due to the
expansive network of partners and traders in the e-commerce platform. Ensuring security …
expansive network of partners and traders in the e-commerce platform. Ensuring security …