Skip to main content
Erschienen in: Automatic Control and Computer Sciences 8/2018

01.12.2018

Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph

verfasst von: A. G. Busygin, A. S. Konoplev, D. P. Zegzhda

Erschienen in: Automatic Control and Computer Sciences | Ausgabe 8/2018

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The methods of protection against attacks on the ad hoc networks in the self-organizing cyber-physical systems are analyzed in the article, and their issues are identified. The authors propose an adaptive management method for the ad hoc network topology, where the blockchain-like directed acyclic graph is applied to solve the identified issues.
Literatur
1.
Zurück zum Zitat Bhattacharyya, A., Banerjee, A., Bose, D., Saha, H.N., and Bhattacharjee, D., Different types of attacks in Mobile ADHOC Network: Prevention and mitigation techniques, arXiv, 2011. https://arxiv.org/ pdf/1111.4090.pdf. Accessed May 23, 2017. Bhattacharyya, A., Banerjee, A., Bose, D., Saha, H.N., and Bhattacharjee, D., Different types of attacks in Mobile ADHOC Network: Prevention and mitigation techniques, arXiv, 2011. https://​arxiv.​org/​ pdf/1111.4090.pdf. Accessed May 23, 2017.
2.
Zurück zum Zitat Karlf, C. and Wagner, D., Secure routing in wireless sensor networks: Attacks and countermeasures, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 113–127. Karlf, C. and Wagner, D., Secure routing in wireless sensor networks: Attacks and countermeasures, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 113–127.
3.
Zurück zum Zitat Wu, B., Chen, J., Wu, J., and Cardei, M., A survey on attacks and countermeasures in mobile ad hoc networks, Wireless Network Secur., 2007, pp. 103–135.CrossRef Wu, B., Chen, J., Wu, J., and Cardei, M., A survey on attacks and countermeasures in mobile ad hoc networks, Wireless Network Secur., 2007, pp. 103–135.CrossRef
4.
Zurück zum Zitat Coltun, R., Ferguson, D., Moy, J., and Lindem, A., RFC 5340. OSPF for IPv6, IETF Tools, 2008. https://tools.ietf.org/html/rfc5340. Accessed May 23, 2017. Coltun, R., Ferguson, D., Moy, J., and Lindem, A., RFC 5340. OSPF for IPv6, IETF Tools, 2008. https://​tools.​ietf.​org/​html/​rfc5340.​ Accessed May 23, 2017.
5.
Zurück zum Zitat Ogier, R. and Spagnolo, P., RFC 5614. Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding, IETF Tools, 2009. https://tools.ietf.org/html/rfc5614. Accessed May 23, 2017. Ogier, R. and Spagnolo, P., RFC 5614. Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding, IETF Tools, 2009. https://​tools.​ietf.​org/​html/​rfc5614.​ Accessed May 23, 2017.
6.
Zurück zum Zitat Popov, S., The tangle, in IOTA: Next Generation Blockchain, 2017. https://www.iotatoken.com/IOTA_Whitepaper.pdf. Accessed April 20, 2018. Popov, S., The tangle, in IOTA: Next Generation Blockchain, 2017. https://​www.​iotatoken.​com/​IOTA_​Whitepaper.​pdf.​ Accessed April 20, 2018.
Metadaten
Titel
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph
verfasst von
A. G. Busygin
A. S. Konoplev
D. P. Zegzhda
Publikationsdatum
01.12.2018
Verlag
Pleiades Publishing
Erschienen in
Automatic Control and Computer Sciences / Ausgabe 8/2018
Print ISSN: 0146-4116
Elektronische ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080059

Weitere Artikel der Ausgabe 8/2018

Automatic Control and Computer Sciences 8/2018 Zur Ausgabe

Neuer Inhalt