In DVB-IPDC system, due to the constraints of handheld devices and the broadcast nature of wireless network, packet loss is inevitable. ECDR-NC proposed is a retransmission encoding packet selection algorithm based on...
详细信息
In DVB-IPDC system, due to the constraints of handheld devices and the broadcast nature of wireless network, packet loss is inevitable. ECDR-NC proposed is a retransmission encoding packet selection algorithm based on the dynamic information updating, which can find the current most effective complete decoding packet. ECDR-NC can not only avoid the redundant encoding packets due to the overlapping among encoding packets, but also reduce the computational complexity compared with the traditional encoding schemes. Furthermore, the retransmission upper bound of ECDR-NC is fully controlled. In time-sensitive applications, to maximize the aggregate number of recovery packets while minimizing the total number of discarded packets due to the time limit according to the priority preference, the adaptive priority scheme EPNC is formulized, and the weighted relation graph is constructed to find the maximum-weighted encoding packets sequence according to the decoding gains. In the same network environment, the performances comparisons between PNC and EPNC show that EPNC is more efficient and more rational, and the average discarded packets ratios ofEPNC can be reduced about 18%~27%. The main contributions of this paper are an effective retransmission encoding packet selection algorithm ECDR-NC proposed, and a new adaptive priority recovery scheme EPNC introduced into DVB-IPDC system.
Nowadays, Federated Learning (FL) has emerged as a prominent technique of model training in Consumer Internet of Things (CIoT) without sharing sensitive local data. Targeting privacy leakage of cross-device FL in CIoT...
详细信息
Nowadays, Federated Learning (FL) has emerged as a prominent technique of model training in Consumer Internet of Things (CIoT) without sharing sensitive local data. Targeting privacy leakage of cross-device FL in CIoT, various privacy-preserving FL schemes have been proposed. Regrettably, existing schemes still face three significant challenges: 1) Current privacy-preserving strategies struggle to fully defend against Byzantine attacks in FL without compromising data privacy;2) Most privacy-preserving techniques (e.g. secret sharing) in FL result in substantial computation and communication overhead;3) The non-colluding dual-server setting limits the applicability of FL. To overcome these challenges, we propose a Byzantine-robust hierarchical federated learning scheme, named BHFL. This scheme not only effectively defends against Byzantine attacks while safeguarding user privacy but also avoids the need for a dual-server architecture. Simultaneously, the hierarchical aggregation structure can effectively train non-IID cross-device data while maintaining high communication efficiency. We evaluate BHFL on several benchmark datasets, and the experimental results demonstrate that BHFL achieves high accuracy and Byzantine robustness compared to the popular FedAvg scheme. Therefore, BHFL is well-suited for CIoT scenarios. IEEE
The growing deployment of Industrial Internet of Things (IIoTs) raises significant authentication concerns, especially in scenarios where resource-constrained devices need to delegate tasks with more powerful entities...
The growing deployment of Industrial Internet of Things (IIoTs) raises significant authentication concerns, especially in scenarios where resource-constrained devices need to delegate tasks with more powerful entities. This critical factor affects the information exchange during the delegation process between the Original User (OU) and the Proxy Signer (PS). The process of delegation communication entails the transfer of signing authority from a delegator to a PS. It enables the proxy signer to sign messages on behalf of delegator. As a result, complexity is increased significantly to enhance both the security and efficiency of communication overhead. To address these challenges in a transparent way, this article proposed and explores the utilization of Zero-Knowledge Proofs (ZKPs) as an additional authentication step in certificateless proxy signature mechanism. Whereas, for security hardness, Hyperelliptic Curve (HEC) is being amalgamated using ‘Schnorr signature’. Performance analysis depicts that the proposed approach exhibits not only minimized communication overhead but also provides optimal security as compared to existing approaches.
暂无评论