skip to main content
survey
Free Access
Just Accepted

A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques

Online AM:20 April 2024Publication History
Skip Abstract Section

Abstract

Information sharing is vital in any communication network environment to enable network operating services take decisions based on the information collected by several deployed computing devices. The various networks that compose cyberspace, as Internet-of-Things (IoT) ecosystems, have significantly increased the need to constantly share information, which is often subject to disturbances. In this sense, the damage of anomalous operations boosted researches aimed at improving resilience to information sharing. Hence, in this survey, we present a systematization of knowledge about scientific efforts for achieving resilience to information sharing on networks. First, we introduce a taxonomy to organize the strategies applied to attain resilience to information sharing on networks, offering brief concepts about network anomalies and connectivity services. Then, we detail the taxonomy in the face of malicious threats, network disruptions, and performance issues, discussing the presented solutions. Next, we analyze the techniques existing in the literature to foster resilience to information exchanged on communication networks to verify their benefits and constraints. Throughout the text, we highlight and argue issues that restrain the use of these techniques during the design and runtime.

References

  1. Tarek Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrede Lepoint, Benjamin Marlin, et al. 2018. Toward an Internet of Battlefield Things: A Resilience Perspective. Computer 51, 11 (nov 2018), 24–36. https://doi.org/10.1109/MC.2018.2876048Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Maryam Abdolkarimi, Sepideh Adabi, and Arash Sharifi. 2018. A new multi-objective distributed fuzzy clustering algorithm for wireless sensor networks with mobile gateways. AEU-International Journal of Electronics and Communications 89 (mar 2018), 92–104. https://doi.org/10.1016/j.aeue.2018.03.020Google ScholarGoogle ScholarCross RefCross Ref
  3. Narges Akhound, Sahar Adabi, Ali Rezaee, and Amir Masoud Rahmani. 2022. Clustering of mobile IoT nodes with support for scheduling of time-sensitive applications in fog and cloud layers. Cluster Computing 25, 2 (apr 2022), 1–29. https://doi.org/10.1007/s10586-022-03579-2Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Hamid Al-Hamadi and Ray Chen. 2017. Trust-Based Decision Making for Health IoT Systems. IEEE Internet of Things Journal 4, 5 (aug 2017), 1408–1419. https://doi.org/10.1109/JIOT.2017.2736446Google ScholarGoogle ScholarCross RefCross Ref
  5. Mirjeta Alinci, Evjola Spaho, Algenti Lala, and Vladi Kolici. 2015. Clustering Algorithms in MANETs: A Review. In Proceedings of the 9th International Conference on Complex, Intelligent, and Software Intensive Systems (Santa Catarina, Brazil) (CISIS). IEEE, New Jersey, USA, 330–335. https://doi.org/10.1109/CISIS.2015.47Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gabriel Antoniu, Luc Bougé, and Mathieu Jan. 2005. JuxMem: An adaptive supportive platform for data sharing on the grid. Scalable Computing: Practice and Experience 6, 33 (sep 2005), 45–55.Google ScholarGoogle Scholar
  7. Gabriel Antoniu, Luc Bougé, Mathieu Jan, and Sébastien Monnet. 2004. Large-Scale Deployment in P2P Experiments Using the JXTA Distributed Framework. In Proceedings of the European Conference on Parallel Processing (Pisa, Italy) (EURO-PAR 2004). Springer, Berlin, Heidelberg, 1038–1047. https://doi.org/10.1007/978-3-540-27866-5_140Google ScholarGoogle ScholarCross RefCross Ref
  8. Gabriel Antoniu, J-F Deverge, and Sébastien Monnet. 2006. How to bring together fault tolerance and data consistency to enable grid data sharing. Concurrency and Computation: Practice and Experience 18, 13 (jan 2006), 1705–1723. https://doi.org/10.1002/cpe.1024Google ScholarGoogle ScholarCross RefCross Ref
  9. Adrian Asensio, Xavier Masip-Bruin, Ramón J Durán, Ignacio de Miguel, G Ren, Shahrokh Daijavad, and Admela Jukan. 2020. Designing an efficient clustering strategy for combined Fog-to-Cloud scenarios. Future Generation Computer Systems 109 (apr 2020), 392–406. https://doi.org/10.1016/j.future.2020.03.056Google ScholarGoogle ScholarCross RefCross Ref
  10. Michael Atighetchi and Aaron Adler. 2014. A framework for resilient remote monitoring. In Proceedings of the 7th International Symposium on Resilient Control Systems (Denver, Colorado, USA) (ISRCS). IEEE, New Jersey, USA, 1–8. https://doi.org/10.1109/ISRCS.2014.6900090Google ScholarGoogle ScholarCross RefCross Ref
  11. Algirdas Avižienis, J-C Laprie, Brian Randell, and Carl Landwehr. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE transactions on dependable and secure computing 1, 1 (oct 2004), 11–33. https://doi.org/10.1109/TDSC.2004.2Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hayfa Ayadi, Ahmed Zouinkhi, Boumedyen Boussaid, and M Naceur Abdelkrim. 2015. A machine learning methods: Outlier detection in WSN. In Proceedings of the 16th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (Monastir, Tunisia) (STA). IEEE, New Jersey, USA, 722–727. https://doi.org/10.1109/STA.2015.7505190Google ScholarGoogle ScholarCross RefCross Ref
  13. Hind Bangui, Mouzhi Ge, and Barbora Buhnova. 2022. A hybrid machine learning model for intrusion detection in VANET. Computing 104, 3 (aug 2022), 503–531. https://doi.org/10.1007/s00607-021-01001-0Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Matthias Baumgart, Christian Scheideler, and Stefan Schmid. 2009. A DoS-resilient information system for dynamic data management. In Proceedings of the 21st annual symposium on Parallelism in algorithms and architectures (Calgary, Canada) (SPAA ’09). ACM, New York, USA, 300–309. https://doi.org/10.1145/1583991.1584064Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Christian Berger, Philipp Eichhammer, Hans P Reiser, Jörg Domaschka, Franz J Hauck, and Gerhard Habiger. 2021. A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms. ACM Computing Surveys (CSUR) 54, 7 (sep 2021), 1–39. https://doi.org/10.1145/3462513Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, and Vincenzo Piuri. 2002. A parity code based fault detection for an implementation of the advanced encryption standard. In Proceedings of the 17th International Symposium on Defect and Fault Tolerance in VLSI Systems (Vancouver, BC, Canada) (DFT 2002). IEEE, New Jersey, USA, 51–59. https://doi.org/10.1109/DFTVS.2002.1173501Google ScholarGoogle ScholarCross RefCross Ref
  17. Johannes Blömer and Jean-Pierre Seifert. 2003. Fault based cryptanalysis of the advanced encryption standard (AES). In Proceedings of the International Conference on Financial Cryptography (Grand Cayman, British West Indies) (FC 2003). Springer, Berlin, Heidelberg, 162–181. https://doi.org/10.1007/978-3-540-45126-6_12Google ScholarGoogle ScholarCross RefCross Ref
  18. Rakesh Bobba, Himanshu Khurana, Musab AlTurki, and Farhana Ashraf. 2009. PBES: A policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (Sydney, Australia) (ASIACCS ’09). ACM, New York, USA, 262–275. https://doi.org/10.1145/1533057.1533093Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jens-Matthias Bohli, Panos Papadimitratos, Donato Verardi, and Dirk Westhoff. 2011. Resilient data aggregation for unattended WSNs. In Proceedings of the 36th Conference on Local Computer Networks (Bonn, Heidelberg) (LCN). IEEE, New Jersey, USA, 994–1002. https://doi.org/10.1109/LCN.2011.6114411Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Joel W Branch, Chris Giannella, Boleslaw Szymanski, Ran Wolff, and Hillol Kargupta. 2013. In-network outlier detection in wireless sensor networks. Knowledge and information systems 34, 1 (jan 2013), 23–54. https://doi.org/10.1007/s10115-011-0474-5Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Levente Buttyàn, Péter Schaffer, and István Vajda. 2007. Resilient aggregations: statistical approach. In Sensor Networks and Configuration. Springer, Heidelberg, Berlin, 211–236.Google ScholarGoogle Scholar
  22. Tanmoy Chakraborty, Ayushi Dalmia, Animesh Mukherjee, and Niloy Ganguly. 2017. Metrics for Community Analysis: A Survey. ACM Computing Surveys (CSUR) 50, 4 (aug 2017), 1–37. https://doi.org/10.1145/3091106Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Runze Cheng, Yao Sun, Lina Mohjazi, Ying-Chang Liang, and Muhammad Ali Imran. 2022. Blockchain-Assisted Intelligent Symbiotic Radio in Space-Air-Ground Integrated Networks. https://doi.org/10.48550/arXiv.2211.05902Google ScholarGoogle ScholarCross RefCross Ref
  24. Yao Cheng, Elsayed A Elsayed, and Zhiyi Huang. 2022. Systems resilience assessments: a review, framework and metrics. International Journal of Production Research 60, 2 (2022), 595–622. https://doi.org/10.1080/00207543.2021.1971789Google ScholarGoogle ScholarCross RefCross Ref
  25. Jin-Hee Cho, Kevin Chan, and Sibel Adali. 2015. A Survey on Trust Modeling. ACM Computing Surveys (CSUR) 48, 2 (oct 2015), 1–40. https://doi.org/10.1145/2815595Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Jin-Hee Cho, Ray Chen, Yating Wang, and Kevin S. Chan. 2013. Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks. In Proceedings of the International Conference on Parallel and Distributed Systems (Seoul, South Korea) (ICPADS). IEEE, New Jersey, USA, 372–379. https://doi.org/10.1109/ICPADS.2013.59Google ScholarGoogle ScholarCross RefCross Ref
  27. Jin-Hee Cho, Ananthram Swami, and Ing-Ray Chen. 2011. A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Communications Surveys Tutorials 13, 4 (oct 2011), 562–583. https://doi.org/10.1109/SURV.2011.092110.00088Google ScholarGoogle ScholarCross RefCross Ref
  28. Yung-Ting Chuang. 2017. Protecting against malicious and selective forwarding attacks for P2P search & retrieval system. Peer-to-Peer Networking and Applications 10, 4 (aug 2017), 1079–1100. https://doi.org/10.1007/s12083-016-0500-1Google ScholarGoogle ScholarCross RefCross Ref
  29. Timothy A Cohn, JF England, CE Berenbrock, RR Mason, JR Stedinger, and JR Lamontagne. 2013. A generalized Grubbs-Beck test statistic for detecting multiple potentially influential low outliers in flood series. Water Resources Research 49, 8 (2013), 5047–5058. https://doi.org/10.1002/wrcr.20392Google ScholarGoogle ScholarCross RefCross Ref
  30. Carlos Colman-Meixner, Chris Develder, Massimo Tornatore, and Biswanath Mukherjee. 2016. A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications. IEEE Communications Surveys & Tutorials 18, 3 (feb 2016), 2244–2281. https://doi.org/10.1109/COMST.2016.2531104Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Mathieu Cunche, Cédric Lauradoux, Marine Minier, and Roksana Boreli. 2013. Private and resilient data aggregation. In 38th Annual IEEE Conference on Local Computer Networks (Sydney, NSW, Australia). IEEE, New Jersey, USA, 759–762. https://doi.org/10.1109/LCN.2013.6761329Google ScholarGoogle ScholarCross RefCross Ref
  32. Anderson Santos da Silva, Paul Smith, Andreas Mauthe, and Alberto Schaeffer-Filho. 2015. Resilience support in software-defined networking: A survey. Computer Networks 92(oct 2015), 189–207. https://doi.org/10.1016/j.comnet.2015.09.012Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Emiliano De Cristofaro, Jens-Matthias Bohli, and Dirk Westhoff. 2009. FAIR: Fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. In Proceedings of the 2nd Conference on Wireless network security (Zürich, Switzerland) (WiSec ’09). ACM, New York, USA, 253–260. https://doi.org/10.1145/1514274.1514309Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Antonio Di Pietro, Stefano Panzieri, and Andrea Gasparri. 2017. Distributed data fusion for situational awareness in critical infrastructures with link failures. In Proceedings of the International Conference on Critical Infrastructure Protection (Arlington, VA, USA) (ICCIP 2017). Springer, Swiss, 99–117. https://doi.org/10.1007/978-3-319-70395-4_6Google ScholarGoogle ScholarCross RefCross Ref
  35. Ciprian Dobre, Florin Pop, and Valentin Cristea. 2010. A fault-tolerant approach to storing objects in distributed systems. In Proceedings of the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (Fukuoka, Japan). IEEE, New Jersey, USA, 1–8. https://doi.org/10.1109/3PGCIC.2010.7Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Mahir Can Doganay, Thomas B Pedersen, Yücel Saygin, Erkay Savaş, and Albert Levi. 2008. Distributed privacy preserving k-means clustering with additive secret sharing. In Proceedings of the 2008 international workshop on Privacy and anonymity in information society (Nantes, France) (PAIS ’08). ACM, New York, USA, 3–11. https://doi.org/10.1145/1379287.1379291Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Wenli Duo, MengChu Zhou, and Abdullah Abusorrah. 2022. A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges. IEEE/CAA Journal of Automatica Sinica 9, 5 (apr 2022), 784–800.Google ScholarGoogle ScholarCross RefCross Ref
  38. Khalil El-Khatib, Gregor v Bochmann, and Abdulmotaleb El-Saddik. 2007. A QoS-based Service Composition for Content Adaptation. In Proceedings of the 23rd International Conference on Data Engineering Workshop (Istanbul, Turkey) (ICDEW). IEEE, New Jersey, USA, 331–338. https://doi.org/10.1109/ICDEW.2007.4401013Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Elena Fasolo, Michele Rossi, Jorg Widmer, and Michele Zorzi. 2007. In-network aggregation techniques for wireless sensor networks: A survey. IEEE wireless communications 14, 2 (apr 2007), 70–87. https://doi.org/10.1109/MWC.2007.358967Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Paolo Ferrari, Alessandra Flammini, Emiliano Sisinni, Stefano Rinaldi, Dennis Brandão, and Murilo Silveira Rocha. 2018. Delay Estimation of Industrial IoT Applications Based on Messaging Protocols. IEEE Transactions on Instrumentation and Measurement 67, 9 (apr 2018), 2188–2199. https://doi.org/10.1109/TIM.2018.2813798Google ScholarGoogle ScholarCross RefCross Ref
  41. Muhammad Firdaus and Kyung-Hyune Rhee. 2021. On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks. Applied Sciences 11, 1 (jan 2021), 414. https://doi.org/10.3390/app11010414Google ScholarGoogle ScholarCross RefCross Ref
  42. Benoit Frenay and Michel Verleysen. 2014. Classification in the Presence of Label Noise: A Survey. IEEE Transactions on Neural Networks and Learning Systems 25, 5(2014), 845–869. https://doi.org/10.1109/TNNLS.2013.2292894Google ScholarGoogle ScholarCross RefCross Ref
  43. Antônio Augusto Fröhlich, Roberto Milton Scheffel, David Kozhaya, and Paulo Esteves Verissimo. 2018. Byzantine resilient protocol for the IoT. IEEE Internet of Things Journal 6, 2 (sep 2018), 2506–2517. https://doi.org/10.1109/JIOT.2018.2871157Google ScholarGoogle ScholarCross RefCross Ref
  44. Saurabh Ganeriwal, Laura K Balzano, and Mani B Srivastava. 2008. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks 4, 3 (jun 2008), 1–37. https://doi.org/10.1145/1362542.1362546Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Timothy Thomas George and Amit Kumar Tyagi. 2022. Reliable Edge Computing Architectures for Crowdsensing Applications. In International Conference on Computer Communication and Informatics (Coimbatore, India) (ICCCI). IEEE, New Jersey, USA, 1–6. https://doi.org/10.1109/ICCCI54379.2022.9740791Google ScholarGoogle ScholarCross RefCross Ref
  46. Ammar Gharaibeh, Mohammad A. Salahuddin, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil, Mohsen Guizani, and Ala Al-Fuqaha. 2017. Smart Cities: A Survey on Data Management, Security, and Enabling Technologies. IEEE Communications Surveys Tutorials 19, 4 (aug 2017), 2456–2501. https://doi.org/10.1109/COMST.2017.2736886Google ScholarGoogle ScholarCross RefCross Ref
  47. Michelle Girvan and Mark EJ Newman. 2002. Community structure in social and biological networks. Proceedings of the national academy of sciences 99, 12 (jun 2002), 7821–7826. https://doi.org/10.1073/pnas.122653799Google ScholarGoogle ScholarCross RefCross Ref
  48. Andreas Gutscher. 2007. A trust model for an open, decentralized reputation system. In Proceedings of the International Conference on Trust Management (New Brunswick, Canada) (IFIPTM 2007). Springer, Boston, MA, USA, 285–300. https://doi.org/10.1007/978-0-387-73655-6_19Google ScholarGoogle ScholarCross RefCross Ref
  49. Simon Hawkins, Hongxing He, Graham Williams, and Rohan Baxter. 2002. Outlier Detection Using Replicator Neural Networks. In Proceedings of the International Conference on Data Warehousing and Knowledge Discovery (Aix-en-Provence, France) (DaWaK 2002). Springer, Heidelberg, Berlin, 170–180. https://doi.org/10.1007/3-540-46145-0_17Google ScholarGoogle ScholarCross RefCross Ref
  50. Ferry Hendrikx, Kris Bubendorfer, and Ryan Chard. 2015. Reputation systems: A survey and taxonomy. J. Parallel and Distrib. Comput. 75 (aug 2015), 184–197. https://doi.org/10.1016/j.jpdc.2014.08.004Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Yaodong Huang, Xintong Song, Fan Ye, Yuanyuan Yang, and Xiaoming Li. 2019. Fair and Efficient Caching Algorithms and Strategies for Peer Data Sharing in Pervasive Edge Computing Environments. IEEE Transactions on Mobile Computing 19, 4 (feb 2019), 852–864. https://doi.org/10.1109/TMC.2019.2902090Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Masayuki Ihara, Shunichi Seko, Akihiro Miyata, Ryosuke Aoki, Tatsuro Ishida, Masahiro Watanabe, Ryo Hashimoto, and Hiroshi Watanabe. 2016. Towards more practical information sharing in disaster situations. In Proceedings of the International Conference on Human Interface and the Management of Information (Toronto, Canada) (HIMI 2016). Springer, Swiss, 32–39. https://doi.org/10.1007/978-3-319-40397-7_4Google ScholarGoogle ScholarCross RefCross Ref
  53. SV Annlin Jeba and B Paramasivan. 2013. Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks. Computers & Electrical Engineering 39, 6 (apr 2013), 1867–1879. https://doi.org/10.1016/j.compeleceng.2013.03.019Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision support systems 43, 2 (2007), 618–644.Google ScholarGoogle Scholar
  55. Igor Kaitovic and Miroslaw Malek. 2018. Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods. IEEE Transactions on Dependable and Secure Computing 17, 3 (feb 2018), 493–505. https://doi.org/10.1109/TDSC.2018.2806448Google ScholarGoogle ScholarCross RefCross Ref
  56. Dong-Kyun Kim, Ki-Sung Yu, Byung-Hyeon Park, and Sang-Ha Kim. 2006. Resilient data delivery in delay bounded overlay multicast. In Proceedings of the 8th International Conference Advanced Communication Technology (Gangwon-Do, South Korea) (ICACT). IEEE, New Jersey, USA, 96–101. https://doi.org/10.1109/ICACT.2006.205926Google ScholarGoogle ScholarCross RefCross Ref
  57. Alexander Kott and Igor Linkov. 2021. To Improve Cyber Resilience, Measure It. Computer 54, 2 (2021), 80–85. https://doi.org/10.1109/MC.2020.3038411Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Gs Kunal and Doreswamy Hosahalli. 2018. Dual-Objectives Mobile-RPL Routing Protocol Based QoS Data Gathering over Low Power Lossy Networks for Smart City Applications: DMRPL. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics(Bangalore, India) (ICACCI). IEEE, New Jersey, USA, 1938–1946. https://doi.org/10.1109/ICACCI.2018.8554449Google ScholarGoogle ScholarCross RefCross Ref
  59. Takio Kurita, Takashi Takahashi, and Yukifumi Ikeda. 2002. A neural network classifier for occluded images. In Proceedings of the International Conference on Pattern Recognition (Quebec City, Quebec, Canada) (ICPR). IEEE, New Jersey, USA, 45–48. https://doi.org/10.1109/ICPR.2002.1047791Google ScholarGoogle ScholarCross RefCross Ref
  60. James Kurose and Keith Ross (Eds.). 2017. Computer Networking: A Top-Down Approach. Pearson Education, Essex, England.Google ScholarGoogle Scholar
  61. Nabila Labraoui, Mourad Gueroui, Makhlouf Aliouat, and Jonathan Petit. 2013. Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication systems 54, 1 (jul 2013), 3–17. https://doi.org/10.1007/s11235-013-9712-3Google ScholarGoogle ScholarCross RefCross Ref
  62. Jean-Claude Laprie. 1985. Dependable computing and fault-tolerance. Digest of Papers the 15th Annual International Symposium on Fault-Tolerant Computing (FTCS-15) 10, 2 (jun 1985), 124. https://doi.org/10.1109/FTCSH.1995.532603Google ScholarGoogle ScholarCross RefCross Ref
  63. Jean-Claude Laprie. 1992. Dependability: Basic concepts and terminology. In Dependability: Basic Concepts and Terminology. Springer, Heidelberg, Berlin, 3–245.Google ScholarGoogle ScholarCross RefCross Ref
  64. Jean-Claude Laprie. 2008. From dependability to resilience. In Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (Anchorage, AK, USA) (DSN 2008). IEEE, New Jersey, USA, G8–G9.Google ScholarGoogle Scholar
  65. Jinyang Li, John Jannotti, Douglas SJ De Couto, David R Karger, and Robert Morris. 2000. A scalable location service for geographic ad hoc routing. In Proceedings of the (Boston, MA, USA) (MobiCom ’00). ACM, New York, USA, 120–130. https://doi.org/10.1145/345910.345931Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Jie Li, Ruidong Li, and Jien Kato. 2008. Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine 46, 4 (apr 2008), 108–114. https://doi.org/10.1109/MCOM.2008.4481349Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Ze Li and Haiying Shen. 2009. A mobility and congestion resilient data management system for distributed mobile networks. In Proceedings of the 6th International Conference on Mobile Adhoc and Sensor Systems (Macau (S.A.R.), China) (MOBHOC). IEEE, New Jersey, USA, 60–69. https://doi.org/10.1109/MOBHOC.2009.5336942Google ScholarGoogle ScholarCross RefCross Ref
  68. Feng Lin, Yi Peng, Taiping Cui, Xiaoge Huang, and Qianbin Chen. 2021. Blockchain based Content Sharing Management in VANETs. In IEEE 93rd Vehicular Technology Conference (Helsinki, Finland) (VTC2021 - Spring). IEEE, New Jersey, USA, 1–5. https://doi.org/10.1109/VTC2021-Spring51267.2021.9449036Google ScholarGoogle ScholarCross RefCross Ref
  69. Yiran Liu, Ye Dong, Hao Wang, Han Jiang, and Qiuliang Xu. 2022. Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices. IEEE Internet of Things Journal 9, 21 (may 2022), 21025–21037. https://doi.org/10.1109/JIOT.2022.3176305Google ScholarGoogle ScholarCross RefCross Ref
  70. Thomas Loruenser, Andreas Happe, and Daniel Slamanig. 2015. ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing. In Proceedings of the 7th International Conference on Cloud Computing Technology and Science(Vancouver, BC, Canada) (CloudCom). IEEE, New Jersey, USA, 371–378. https://doi.org/10.1109/CloudCom.2015.71Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Yong Lu and Na Sun. 2018. A resilient data aggregation method based on spatio-temporal correlation for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking 2018, 1(jun 2018), 1–9. https://doi.org/10.1186/s13638-018-1173-7Google ScholarGoogle ScholarCross RefCross Ref
  72. Ying-Jin Lu and Jun He. 2017. Dempster-Shafer Evidence Theory and Study of Some Key Problems. Journal of Electronic Science and Technology 15, 1(2017), 106–112.Google ScholarGoogle Scholar
  73. Yong-Jian Luo, Xin Yang, and Xu Zhang. 2007. An Effective Resilient Data Aggregation Algorithm in Wireless Sensor Networks. In 2007 International Conference on Wireless Communications, Networking and Mobile Computing(Shanghai, China). IEEE, New Jersey, USA, 2642–2645. https://doi.org/10.1109/WICOM.2007.657Google ScholarGoogle ScholarCross RefCross Ref
  74. Elmer R Magsino and Ivan Wang-Hei Ho. 2022. An Enhanced Information Sharing Roadside Unit Allocation Scheme for Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems 23, 9(jan 2022), 15462–15475. https://doi.org/10.1109/TITS.2022.3140801Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Dubravko Miljković. 2011. Fault detection methods: A literature survey. In Proceedings of the 34th International Convention(Opatija, Croatia) (MIPRO). IEEE, New Jersey, USA, 750–755.Google ScholarGoogle Scholar
  76. Franco Minucci, Evgenii Vinogradov, Hazem Sallouha, and Sofie Pollin. 2019. UAV Location Broadcasting with Wi-Fi SSID. In Proceedings of the Wireless Days (Manchester, England) (WD). IEEE, New Jersey, USA, 1–8. https://doi.org/10.1109/WD.2019.8734208Google ScholarGoogle ScholarCross RefCross Ref
  77. Sushruta Mishra and Hiren Thakkar. 2012. Features of WSN and Data Aggregation techniques in WSN: A Survey. International Journal of Engineering and Innovative Technology 1, 4(apr 2012), 264–273.Google ScholarGoogle Scholar
  78. Stuart Mitchell, Michael OSullivan, and Iain Dunning. 2011. PuLP: A linear programming toolkit for python. The University of Auckland 65 (Sept. 2011), 1–12.Google ScholarGoogle Scholar
  79. Raffaele Montella, Mario Ruggieri, and Sokol Kosta. 2018. A fast, secure, reliable, and resilient data transfer framework for pervasive IoT applications. In Proceedings of the Conference on Computer Communications Workshops (Honolulu, HI, USA) (INFOCOM WKSHPS). IEEE, New Jersey, USA, 710–715. https://doi.org/10.1109/INFCOMW.2018.8406884Google ScholarGoogle ScholarCross RefCross Ref
  80. Lik Mui, Mojdeh Mohtashemi, and Ari Halberstadt. 2002. Notions of reputation in multi-agents systems: A review. In Proceedings of the 1st international joint conference on Autonomous agents and multiagent systems: part 1(Bologna, Italy) (AAMAS ’02). ACM, New York, USA, 280–287. https://doi.org/10.1145/544741.544807Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Daniele Munaretto, Chunlei An, Joerg Widmer, and Andreas Timm-Giel. 2011. Resilient data gathering and communication algorithms for emergency scenarios. Telecommunication Systems 48, 3 (may 2011), 317–327. https://doi.org/10.1007/s11235-010-9346-7Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Andrea Munari, Wolfgang Schott, and Yee Wei Law. 2009. Dynamic tunnel routing for reliable and resilient data forwarding in wireless sensor networks. In IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications (Tokyo, Japan). IEEE, New Jersey, USA, 1178–1182. https://doi.org/10.1109/PIMRC.2009.5450314Google ScholarGoogle ScholarCross RefCross Ref
  83. Bogdan Nicolae. 2015. Leveraging Naturally Distributed Data Redundancy to Reduce Collective I/O Replication Overhead. In Proceedings of the International Parallel and Distributed Processing Symposium (Hyderabad, India) (IPDPS). IEEE, New Jersey, USA, 1023–1032. https://doi.org/10.1109/IPDPS.2015.82Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Pavan Nuggehalli, Vikram Srinivasan, C-F Chiasserini, and Ramesh R Rao. 2006. Efficient Cache Placement in Multi-Hop Wireless Networks. IEEE/ACM Transactions on Networking 14, 05 (Oct. 2006), 1045–1055. https://doi.org/10.1109/TNET.2006.882863Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. US Department of Homeland Security. 2018. DHS Lexicon Terms and Definitions. US Department of Homeland Security. Retrieved Mar, 2022 from https://www.dhs.gov/sites/default/files/publications/18_0116_MGMT_DHS-Lexicon.pdfGoogle ScholarGoogle Scholar
  86. Samuel D Okegbile, Jun Cai, and Attahiru S Alfa. 2022. Practical Byzantine fault tolerance-enhanced blockchain-enabled data sharing system: Latency and age of data package analysis. IEEE Transactions on Mobile Computing - Early Access (nov 2022), 1–17. https://doi.org/10.1109/TMC.2022.3223306Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. Diego Ongaro and John Ousterhout. 2014. In search of an understandable consensus algorithm (extended version). In Proceedings of USENIX annual technical conference (Philadelphia, USA) (USENIX ATC). USENIX Association, Berkeley, USA, 305–319. https://www.usenix.org/conference/atc14/technical-sessions/presentation/ongaroGoogle ScholarGoogle Scholar
  88. Zhen Pang, Yuan Yao, Qiuyan Li, Xiaoqin Zhang, and Jing Zhang. 2022. Electronic Health Records Sharing Model Based on Blockchain With Checkable State PBFT Consensus Algorithm. IEEE Access 10(jul 2022), 87803–87815. https://doi.org/10.1109/ACCESS.2022.3186682Google ScholarGoogle ScholarCross RefCross Ref
  89. Yi Peng, Taiping Cui, Bin Shen, Feng Lin, Xiaoge Huang, and Qianbin Chen. 2022. Blockchain-assisted D2D Data Sharing in Fog Computing. In IEEE 95th Vehicular Technology Conference (Helsinki, Finland) (VTC2022-Spring). IEEE, New Jersey, USA, 1–5. https://doi.org/10.1109/VTC2022-Spring54318.2022.9861033Google ScholarGoogle ScholarCross RefCross Ref
  90. Manuel Gil Pérez, Juan E Tapiador, John A Clark, Gregorio Martínez Pérez, and Antonio F Skarmeta Gómez. 2014. Trustworthy placements: Improving quality and resilience in collaborative attack detection. Computer Networks 58(sep 2014), 70–86. https://doi.org/10.1016/j.comnet.2013.08.026Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Carlos R Perez-Toro, Rajesh K Panta, and Saurabh Bagchi. 2010. RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network. In Proceedings of the 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (Boston, MA, USA) (SECON). IEEE, New Jersey, USA, 1–9. https://doi.org/10.1109/SECON.2010.5508273Google ScholarGoogle ScholarCross RefCross Ref
  92. Roberto Pietrantuono, Massimo Ficco, and Francesco Palmieri. 2023. Testing the Resilience of MEC-based IoT Applications Against Resource Exhaustion Attacks. Transactions on Dependable and Secure Computing Early access (2023), 1–15. https://doi.org/10.1109/TDSC.2023.3263137Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Victor Prokhorenko and M Ali Babar. 2020. Architectural Resilience in Cloud, Fog and Edge Systems: A Survey. IEEE Access 8(feb 2020), 28078–28095. https://doi.org/10.1109/ACCESS.2020.2971007Google ScholarGoogle ScholarCross RefCross Ref
  94. Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, and Malrey Lee. 2012. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges. Sensors 12, 1 (jan 2012), 650–685. https://doi.org/10.3390/s120100650Google ScholarGoogle ScholarCross RefCross Ref
  95. Jacek Rak, Magnus Jonsson, and Alexey Vinel. 2016. A taxonomy of challenges to resilient message dissemination in VANETs. In Proceedings of the 17th International Telecommunications Network Strategy and Planning Symposium (Montreal, Canada) (NETWKS). IEEE, New Jersey, USA, 127–132. https://doi.org/10.1109/NETWKS.2016.7751164Google ScholarGoogle ScholarCross RefCross Ref
  96. Andres J Ramirez, Betty HC Cheng, and Philip K McKinley. 2011. An evolutionary approach to network self-organization and resilient data diffusion. In Proceedings of the 5th International Conference on Self-Adaptive and Self-Organizing Systems (Ann Arbor, MI, USA) (SASO). IEEE, New Jersey, USA, 198–207. https://doi.org/10.1109/SASO.2011.31Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Aida Rashidinejad, Bart Wetzels, Michel Reniers, Liyong Lin, Yuting Zhu, and Rong Su. 2019. Supervisory Control of Discrete-Event Systems under Attacks: An Overview and Outlook. In Proceedings of the 18th European Control Conference (Naples, Italy) (ECC). IEEE, New Jersey, USA, 1732–1739. https://doi.org/10.23919/ECC.2019.8795849Google ScholarGoogle ScholarCross RefCross Ref
  98. Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, and Fang Yu. 2003. Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. Mobile networks and applications 8, 4 (aug 2003), 427–442. https://doi.org/10.1023/A:1024591915518Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Shu Qin Ren and Jong Sou Park. 2008. Density mining based resilient data aggregation for wireless sensor network. In Proceedings of the 4th International Conference on Networked Computing and Advanced Information Management (Gyeongju, South Korea) (NCM). IEEE, New Jersey, USA, 261–266. https://doi.org/10.1109/NCM.2008.92Google ScholarGoogle ScholarCross RefCross Ref
  100. Fernando Rosas, Kwang-Cheng Chen, and Deniz Gündüz. 2018. Social learning for resilient data fusion against data falsification attacks. Computational social networks 5, 1 (oct 2018), 1–25. https://doi.org/10.1186/s40649-018-0057-7Google ScholarGoogle ScholarCross RefCross Ref
  101. Sankardas Roy, Sanjeev Setia, and Sushil Jajodia. 2006. Attack-resilient hierarchical data aggregation in sensor networks. In Proceedings of the 4th ACM workshop on Security of ad hoc and sensor networks (Alexandria, VA, USA) (SASN ’06). ACM, New York, USA, 71–82. https://doi.org/10.1145/1180345.1180355Google ScholarGoogle ScholarDigital LibraryDigital Library
  102. Utsa Roy, Satyaki Roy, Rajshekhar Khan, Preetam Ghosh, and Nirnay Ghosh. 2022. MCR: A Motif Centrality-Based Distributed Message Routing for Disaster Area Networks. IEEE Internet of Things Journal 9, 24 (aug 2022), 25337–25349. https://doi.org/10.1109/JIOT.2022.3196150Google ScholarGoogle ScholarCross RefCross Ref
  103. Sini Ruohomaa, Lea Kutvonen, and Eleni Koutrouli. 2007. Reputation Management Survey. In Proceedings of the 2nd International Conference on Availability, Reliability and Security (Vienna, Austria) (ARES’07). IEEE, New Jersey, USA, 103–111. https://doi.org/10.1109/ARES.2007.123Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Jordi Sabater and Carles Sierra. 2001. REGRET: Reputation in gregarious societies. In Proceedings of the 5th international conference on Autonomous agents (Montreal, Canada) (AGENTS ’01). ACM, New York, NY, USA, 194–195. https://doi.org/10.1145/375735.376110Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Iman Dakhil Idan Saeedi and Ali Kadhum M Al-Qurabat. 2021. A Systematic Review of Data Aggregation Techniques in Wireless Sensor Networks. In Proceedings of the Iraqi Academics Syndicate International Conference for Pure and Applied Sciences (Babylon, Iraq) (IICPS). IOP Publishing Ltd, Bristol, UK, 012194–012208. https://doi.org/10.1088/1742-6596/1818/1/012194Google ScholarGoogle ScholarCross RefCross Ref
  106. S Kokilavani Sankaralingam, N Sathishkumar Nagarajan, and AS Narmadha. 2020. Energy aware decision stump linear programming boosting node classification based data aggregation in WSN. Computer Communications 155 (mar 2020), 133–142. https://doi.org/10.1016/j.comcom.2020.02.062Google ScholarGoogle ScholarCross RefCross Ref
  107. Arman Sargolzaei, Kang K Yen, Mohamed N Abdelghani, Saman Sargolzaei, and Bogdan Carbunar. 2017. Resilient Design of Networked Control Systems Under Time Delay Switch Attacks, Application in Smart Grid. IEEE Access 5(jul 2017), 15901–15912. https://doi.org/10.1109/ACCESS.2017.2731780Google ScholarGoogle ScholarCross RefCross Ref
  108. Thomas Schmitt. 2022. The ONE - The Opportunistic Network Environment simulator. Ari Keränen. Retrieved Jan, 2022 from https://akeranen.github.io/the-one/Google ScholarGoogle Scholar
  109. Martín Serrano, Steven Davy, Martin Johnsson, Willie Donnelly, and Alex Galis. 2011. Review and Designs of Federated Management in Future Internet Architectures. In Proceedings of the Future Internet Assembly (Budapest, Hungary) (FIA 2011). Springer, Heidelberg, Berlin, 51–66. https://doi.org/10.1007/978-3-642-20898-0_4Google ScholarGoogle ScholarCross RefCross Ref
  110. Daniel Seybold, Simon Volpert, Stefan Wesner, André Bauer, Nikolas Herbst, and Jörg Domaschka. 2019. Kaa: Evaluating Elasticity of Cloud-Hosted DBMS. In Proceedings of the International Conference on Cloud Computing Technology and Science (Sydney, Australia) (CloudCom). IEEE, New Jersey, USA, 54–61. https://doi.org/10.1109/CloudCom.2019.00020Google ScholarGoogle ScholarCross RefCross Ref
  111. Sujie Shao, Weichao Gong, Huifeng Yang, Shaoyong Guo, Liandong Chen, and Ao Xiong. 2021. Data Trusted Sharing Delivery: A blockchain assisted software-defined content delivery network. IEEE Internet of Things Journal 10, 14 (oct 2021), 11949–11959. https://doi.org/10.1109/JIOT.2021.3124091Google ScholarGoogle ScholarCross RefCross Ref
  112. Sanaa Sharafeddine and Omar Farhat. 2018. A proactive scalable approach for reliable cluster formation in wireless networks with D2D offloading. Ad Hoc Networks 77(apr 2018), 42–53. https://doi.org/10.1016/j.adhoc.2018.04.010Google ScholarGoogle ScholarCross RefCross Ref
  113. Haiying Shen, Ze Li, and Kang Chen. 2013. A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks. IEEE Transactions on Parallel and Distributed Systems 25, 5 (jul 2013), 1124–1134. https://doi.org/10.1109/TPDS.2013.174Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Chi-Sheng Shih, Pi-Cheng Hsiu, Yuan-Hao Chang, and Tei-Wei Kuo. 2016. Framework designs to enhance reliable and timely services of disaster management systems. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (Austin, Texas, USA) (ICCAD). IEEE, New Jersey, USA, 1–8. https://doi.org/10.1145/2966986.2980090Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. SG Shilpa and S Meenakshi Sundaram. 2017. Data Aggregation Techniques Over Wireless Sensor Network - A Review. Proceedings of the National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA) 5, 22 (apr 2017), 904. https://doi.org/10.17577/IJERTCONV5IS22016Google ScholarGoogle ScholarCross RefCross Ref
  116. Roshan Singh and Sukumar Nandi. 2023. An Improved PBFT-Based Consensus Protocol for Industrial IoT. In IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (Bangalore, India) (CCGridW). IEEE, New Jersey, USA, 311–312. https://doi.org/10.1109/CCGridW59191.2023.00068Google ScholarGoogle ScholarCross RefCross Ref
  117. Zichao Song, Tanping Zhou, Weidong Zhong, Dong Chen, Longfei Liu, and Xiaoyuan Yang. 2023. Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid. IEEE Access 11(ul 2023), 2169–3536. https://doi.org/10.1109/ACCESS.2023.3292586Google ScholarGoogle ScholarCross RefCross Ref
  118. Vasilis Sourlas, Onur Ascigil, Ioannis Psaras, and George Pavlou. 2018. Enhancing Information Resilience in Disruptive Information-Centric Networks. IEEE Transactions on Network and Service Management 15, 2 (mar 2018), 746–760. https://doi.org/10.1109/TNSM.2018.2811944Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Cledson Sousa, Ricardo C Carrano, Luiz CS Magalhaes, and Célio VN Albuquerque. 2014. STELE: A Simple Technique for Local delay Estimation in WSN. In Proceedings of the Symposium on Computers and Communications (Funchal, Madeira, Portugal) (ISCC). IEEE, New Jersey, USA, 1–6. https://doi.org/10.1109/ISCC.2014.6912533Google ScholarGoogle ScholarCross RefCross Ref
  120. James PG Sterbenz, David Hutchison, Egemen K Çetinkaya, Abdul Jabbar, Justin P Rohrer, Marcus Schöller, and Paul Smith. 2010. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer networks 54, 8 (mar 2010), 1245–1265. https://doi.org/10.1016/j.comnet.2010.03.005Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Tim Stobierski. 2019. What is Statistical Modeling For Data Analysis?Northeastern University. Retrieved Jan, 2022 from https://www.northeastern.edu/graduate/blog/statistical-modeling-for-data-analysisGoogle ScholarGoogle Scholar
  122. Irshad Ahmed Sumra, Halabi Bin Hasbullah, and Jamalul-lail Bin AbManan. 2015. Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey. In Vehicular Ad-Hoc Networks for Smart Cities. Springer, Heidelberg, Berlin, 51–61.Google ScholarGoogle Scholar
  123. Jihoon Sung, Minseok Kim, Kyongchun Lim, and June-Koo Kevin Rhee. 2016. Efficient Cache Placement Strategy in Two-Tier Wireless Content Delivery Network. IEEE Transactions on Multimedia 18, 6 (2016), 1163–1174. https://doi.org/10.1109/TMM.2016.2543658Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Mohammed Tarique, Kemal E Tepe, Sasan Adibi, and Shervin Erfani. 2009. Survey of multipath routing protocols for mobile ad hoc networks. Journal of Network and computer applications 32, 6 (jul 2009), 1125–1143. https://doi.org/10.1016/j.jnca.2009.07.002Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. Michel Toulouse, Hai Le, Cao Vien Phung, and Denis Hock. 2017. Defense strategies against byzantine attacks in a consensus-based network intrusion detection system. Informatica - An International Journal of Computing and Informatics 41, 2(jun 2017), 1–16.Google ScholarGoogle Scholar
  126. Christos Tsigkanos, Stefan Nastic, and Schahram Dustdar. 2019. Towards Resilient Internet of Things: Vision, Challenges, and Research Roadmap. In Proceedings of the (Dallas, Texas, USA) (ICDCS). IEEE, New Jersey, USA, 1754–1764. https://doi.org/10.1109/ICDCS.2019.00174Google ScholarGoogle ScholarCross RefCross Ref
  127. Rao M. Venkateswara and Srinivas Malladi. 2021. Secure Intruder Information Sharing in Wireless Sensor Network for Attack Resilient Routing. International Journal of Advanced Computer Science and Applications 12 (2021), 504–510. https://doi.org/10.14569/IJACSA.2021.0120263Google ScholarGoogle ScholarCross RefCross Ref
  128. D.C. Verma. 2004. Service level agreements on IP networks. Proc. IEEE 92, 9 (aug 2004), 1382–1388. https://doi.org/10.1109/JPROC.2004.832969Google ScholarGoogle ScholarCross RefCross Ref
  129. N Vijayarani and A Senthilkumar. 2017. Multipath Routing Protocols in Wireless Sensor Networks: A Retrospective Review. Indian Journal of Science and Technology 10, 1 (apr 2017), 1–9. https://doi.org/10.17485/ijst/2017/v10i17/106581Google ScholarGoogle ScholarCross RefCross Ref
  130. Eric D Vugrin, Drake E Warren, and Mark A Ehlen. 2011. A resilience assessment framework for infrastructure and economic systems: Quantitative and qualitative resilience analysis of petrochemical supply chains to a hurricane. Process Safety Progress 30, 3 (mar 2011), 280–290. https://doi.org/10.1002/prs.10437Google ScholarGoogle ScholarCross RefCross Ref
  131. Marko Vukolić. 2016. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. In Open Problems in Network Security: International Workshop (Zurich, Switzerland) (iNetSec 2015). Springer, Berlin, Heidelberg, 112–125. https://doi.org/10.1007/978-3-319-39028-4_9Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Xinlei Wang, Kannan Govindan, and Prasant Mohapatra. 2011. Collusion-resilient quality of information evaluation based on information provenance. In Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks(Salt Lake City, UT, USA) (SAHCN). IEEE, New Jersey, USA, 395–403. https://doi.org/10.1109/SAHCN.2011.5984923Google ScholarGoogle ScholarCross RefCross Ref
  133. Thomas Welsh and Elhadj Benkhelifa. 2017. Perspectives on Resilience in Cloud Computing: Review and Trends. In Proceedings of the 14th International Conference on Computer Systems and Applications (Hammamet, Tunisia) (AICCSA). IEEE, New Jersey, USA, 696–703. https://doi.org/10.1109/AICCSA.2017.221Google ScholarGoogle ScholarCross RefCross Ref
  134. Thomas Welsh and Elhadj Benkhelifa. 2020. On Resilience in Cloud Computing: A Survey of Techniques across the Cloud Domain. Comput. Surveys 53, 3 (may 2020), 1–36. https://doi.org/10.1145/3388922Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, JP. Vasseur, and R. Alexander. 2012. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550. Internet Engineering Task Force (IETF). http://www.rfc-editor.org/rfc/rfc6550.txtGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  136. Kun Wu. 2023. Optimizing Consensus Protocols with Machine Learning Models: A cache-based approach. Master’s Thesis. KTH Royal Institute Of Technology, Stockholm, Sweden.Google ScholarGoogle Scholar
  137. Liqiang Wu, Ming Xu, Shaojing Fu, Yuchuan Luo, and Yuechuan Wei. 2021. FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid. IEEE Internet of Things Journal 9, 7 (aug 2021), 5254–5265. https://doi.org/10.1109/JIOT.2021.3109153Google ScholarGoogle ScholarCross RefCross Ref
  138. Xin Xu, Haitao Zhang, Tianxiang Li, and Lixia Zhang. 2018. Achieving resilient data availability in wireless sensor networks. In Proceedings of the International Conference on Communications Workshops (Kansas City, MO, USA) (ICC Workshops). IEEE, New Jersey, USA, 1–6. https://doi.org/10.1109/ICCW.2018.8403581Google ScholarGoogle ScholarCross RefCross Ref
  139. Xin Yang, Ruo-Peng Yang, and Dong-Dong Wu. 2016. A Resilient Data Fusion Algorithm in Wireless Sensor Networks. In 2016 International Conference on Information System and Artificial Intelligence (ISAI). IEEE, New Jersey, USA, 192–195. https://doi.org/10.1109/ISAI.2016.0049Google ScholarGoogle ScholarCross RefCross Ref
  140. Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, and Sean Carlisto de Alvarenga. 2017. A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications 84 (feb 2017), 25–37. https://doi.org/10.1016/j.jnca.2017.02.009Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. Xinhua Zhang, Lin You, and Gengran Hu. 2022. An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain. IEEE Transactions on Network and Service Management 19, 4 (oct 2022), 3949–3959. https://doi.org/10.1109/TNSM.2022.3217312Google ScholarGoogle ScholarCross RefCross Ref
  142. Xian-Ming Zhang, Qing-Long Han, Xiaohua Ge, Derui Ding, Lei Ding, Dong Yue, and Chen Peng. 2020. Networked control systems: A survey of trends and techniques. IEEE/CAA Journal of Automatica Sinica 7, 1 (Jan. 2020), 1–17. https://doi.org/10.1109/JAS.2019.1911651Google ScholarGoogle ScholarCross RefCross Ref
  143. Charikleia Zouridaki, Brian L Mark, Marek Hejmo, and Roshan K Thomas. 2009. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks. Ad Hoc Networks 7, 6 (oct 2009), 1156–1168. https://doi.org/10.1016/j.adhoc.2008.10.003Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM Computing Surveys
              ACM Computing Surveys Just Accepted
              ISSN:0360-0300
              EISSN:1557-7341
              Table of Contents

              Copyright © 2024 Copyright held by the owner/author(s). Publication rights licensed to ACM.

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Online AM: 20 April 2024
              • Accepted: 13 April 2024
              • Revised: 4 April 2024
              • Received: 10 February 2023

              Check for updates

              Qualifiers

              • survey
            • Article Metrics

              • Downloads (Last 12 months)96
              • Downloads (Last 6 weeks)96

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader