This paper concentrates on the finite-time clock synchronization problem for wireless sensor networks (WSNs) under deception attacks. Compared with adding additional communication links to a network, we introduce a ne...
详细信息
This paper concentrates on the finite-time clock synchronization problem for wireless sensor networks (WSNs) under deception attacks. Compared with adding additional communication links to a network, we introduce a new mechanism termed as "trusted link" to improve the resilience of the network, and show that with small changes (set a fraction of links as the trusted links) in the network structure the network robustness for deception attacks can be improved significantly. Then, an iterative learning control based consensus control methodology with built-in attack mitigation mechanism is proposed. Not only the security and robustness are guaranteed by the proposed controller, but also the convergence time is fixed, which makes the synchronization algorithm more suitable for practical WSNs. Finally, simulation results are provided to demonstrate the effectiveness of the theoretical results.
The least trimmed squares (LTS) is a reasonable formulation of robust regression whereas it suffers from high computational cost due to the nonconvexity and nonsmoothness of its objective function. The most frequently...
详细信息
The theory of boosting provides a computational framework for aggregating approximate weak learning algorithms, which perform marginally better than a random predictor, into an accurate strong learner. In the realizab...
详细信息
Google's success derives in large part from its PageRank algorithm, which assign a score to every web page according to its importance. Recently, G. Modjtaba et al. (2021) [19] proved that similar vertices in a gr...
详细信息
This study addresses the design and analysis of distributed formation tracking control with disturbance rejection capability for a group of quadrotors that are perturbed by time-varying external disturbances. The prop...
详细信息
This study addresses the design and analysis of distributed formation tracking control with disturbance rejection capability for a group of quadrotors that are perturbed by time-varying external disturbances. The proposed approach consists of two control loops: inner-loop and outer-loop control. In the inner-loop control, feedback linearization (FL) of the quadrotor system in the presence of disturbance yields linear equations with unknown disturbance parts. The unknown disturbance parts are estimated in the outer-loop control by using a disturbance observer (DO). Since the DO produces an estimation error or called residual error when estimating time-varying disturbance, this study introduces a radial basis function neural network (RBFNN) with adaptive weight to effectively approximate and eliminate the residual error. Then, to complete the formation mission, a consensus-based algorithm is implemented in the outer-loop control to enable the distributed formation tracking. The capabilities of formation tracking and online approximating are proved via the Lyapunov approach. Simulation of the quadrotor formation in the presence of time-varying wind disturbance was conducted to evaluate the effectiveness of the approach where the results obtained illustrate the robustness of the quadrotor formation towards the disturbances.
The adoption of blockchain platforms to bolster the security of Internet of Things (IoT) systems has attracted significant attention in recent years. Currently, there is a lack of comprehensive and systematic survey p...
详细信息
The adoption of blockchain platforms to bolster the security of Internet of Things (IoT) systems has attracted significant attention in recent years. Currently, there is a lack of comprehensive and systematic survey papers in the literature addressing these platforms. This paper discusses six of the most popular emerging blockchain platforms adopted by IoT systems and analyses their usage in state-of-the-art works to solve security problems. The platform was compared in terms of security features and other requirements. Findings from the study reveal that most blockchain components contribute directly or indirectly to IoT security. Blockchain platform components such as cryptography, consensus mechanism, and hashing are common ways that security is achieved in all blockchain platform for IoT. Technologies like Interplanetary File System (IPFS) and Transport Layer Security (TLS) can further enhance data and communication security when used alongside blockchain. To enhance the applicability of blockchain in resource-constrained IoT environments, future research should focus on refining cryptographic algorithms and consensus mechanisms to optimise performance and security.
Intelligent algorithm recommendation technology, which is starting a new era of information dissemination, gradually diffuses in the network, constructing social thoughts, behaviors and values. In the era of intellige...
详细信息
Mobile edge computing (MEC) promotes the development and popularity of Internet of Things (IoT) devices with higher connectivity and ultra-low latency through network topology optimization and real-time data analysis....
详细信息
Mobile edge computing (MEC) promotes the development and popularity of Internet of Things (IoT) devices with higher connectivity and ultra-low latency through network topology optimization and real-time data analysis. With the exponential growth of data traffic generated by IoT devices, it is essential to prevent edge servers (ESs) from overloading through efficient task scheduling to ensure the quality of service (QoS). However, the lack of trust and incentive mechanisms between ESs deployed and managed by different infrastructure providers makes it challenging to perform peer-offloaded tasks. Moreover, to meet the low-latency requirement of many IoT applications, the execution efficiency of the task scheduling scheme in MEC needs to be improved. To address the above challenges systematically, a QoS-driven task scheduling scheme with blockchain in MEC named SharpEdge is proposed. In SharpEdge, ESs publish tasks with rewards and then select the most reliable executors through a historical performance-based reputation mechanism to perform peer offloading. The performance of the executor will be recorded into the blockchain after the task is completed. In addition, a concurrent consensus mechanism using sharding technology is designed, improving task scheduling efficiency. We implement SharpEdge based on Hyperledger Fabric and verify its performance in a simulated MEC environment.
Let {un}∞n=1 be the Sylvester’s sequence (sequence A000058 in the OEIS), and let a1 ∞i=1 a1i = 1. In this paper, we solve a conjecture of Erdős and Graham, which asks whether (formula presented) We prove this conje...
详细信息
The recent integration of blockchain technology with the Internet of Things (IoT) has created a new platform for secure and decentralized communication among IoT devices. However, this integration has raised concerns ...
详细信息
ISBN:
(数字)9798331513733
ISBN:
(纸本)9798331513740
The recent integration of blockchain technology with the Internet of Things (IoT) has created a new platform for secure and decentralized communication among IoT devices. However, this integration has raised concerns about privacy preservation due to the inherent transparency and immutability of the blockchain. To address these challenges, our paper presents a comprehensive framework for privacy preservation in IoT-based blockchain systems. We propose a privacy-preserving blockchain-based framework that classifies transactions as public or private at the IoT level, using a combination of low-computation cryptographic techniques and a low-complexity consensus protocol to ensure data confidentiality and privacy. Additionally, we integrate an anomaly-based intrusion detection system (IDS) to monitor and address threats in real time, making IoT networks resilient against evolving cyber threats. We evaluated our proposed system model through comprehensive simulations and experiments, demonstrating the practicality and effectiveness of our approach in real-world IoT scenarios. Our findings show that our proposed protocol can comprehensively safeguard the privacy of IoT data while maintaining the security and transparency inherent in blockchain-based systems. This private-by-design model provides a real-world solution to privacy concerns in IoT-based blockchain systems, contributing to the development of secure, decentralized IoT communication.
暂无评论