Abstract
Information sharing is vital in any communication network environment to enable network operating services take decisions based on the information collected by several deployed computing devices. The various networks that compose cyberspace, as Internet-of-Things (IoT) ecosystems, have significantly increased the need to constantly share information, which is often subject to disturbances. In this sense, the damage of anomalous operations boosted researches aimed at improving resilience to information sharing. Hence, in this survey, we present a systematization of knowledge about scientific efforts for achieving resilience to information sharing on networks. First, we introduce a taxonomy to organize the strategies applied to attain resilience to information sharing on networks, offering brief concepts about network anomalies and connectivity services. Then, we detail the taxonomy in the face of malicious threats, network disruptions, and performance issues, discussing the presented solutions. Next, we analyze the techniques existing in the literature to foster resilience to information exchanged on communication networks to verify their benefits and constraints. Throughout the text, we highlight and argue issues that restrain the use of these techniques during the design and runtime.
- Tarek Abdelzaher, Nora Ayanian, Tamer Basar, Suhas Diggavi, Jana Diesner, Deepak Ganesan, Ramesh Govindan, Susmit Jha, Tancrede Lepoint, Benjamin Marlin, et al. 2018. Toward an Internet of Battlefield Things: A Resilience Perspective. Computer 51, 11 (nov 2018), 24–36. https://doi.org/10.1109/MC.2018.2876048Google ScholarDigital Library
- Maryam Abdolkarimi, Sepideh Adabi, and Arash Sharifi. 2018. A new multi-objective distributed fuzzy clustering algorithm for wireless sensor networks with mobile gateways. AEU-International Journal of Electronics and Communications 89 (mar 2018), 92–104. https://doi.org/10.1016/j.aeue.2018.03.020Google ScholarCross Ref
- Narges Akhound, Sahar Adabi, Ali Rezaee, and Amir Masoud Rahmani. 2022. Clustering of mobile IoT nodes with support for scheduling of time-sensitive applications in fog and cloud layers. Cluster Computing 25, 2 (apr 2022), 1–29. https://doi.org/10.1007/s10586-022-03579-2Google ScholarDigital Library
- Hamid Al-Hamadi and Ray Chen. 2017. Trust-Based Decision Making for Health IoT Systems. IEEE Internet of Things Journal 4, 5 (aug 2017), 1408–1419. https://doi.org/10.1109/JIOT.2017.2736446Google ScholarCross Ref
- Mirjeta Alinci, Evjola Spaho, Algenti Lala, and Vladi Kolici. 2015. Clustering Algorithms in MANETs: A Review. In Proceedings of the 9th International Conference on Complex, Intelligent, and Software Intensive Systems (Santa Catarina, Brazil) (CISIS). IEEE, New Jersey, USA, 330–335. https://doi.org/10.1109/CISIS.2015.47Google ScholarDigital Library
- Gabriel Antoniu, Luc Bougé, and Mathieu Jan. 2005. JuxMem: An adaptive supportive platform for data sharing on the grid. Scalable Computing: Practice and Experience 6, 33 (sep 2005), 45–55.Google Scholar
- Gabriel Antoniu, Luc Bougé, Mathieu Jan, and Sébastien Monnet. 2004. Large-Scale Deployment in P2P Experiments Using the JXTA Distributed Framework. In Proceedings of the European Conference on Parallel Processing (Pisa, Italy) (EURO-PAR 2004). Springer, Berlin, Heidelberg, 1038–1047. https://doi.org/10.1007/978-3-540-27866-5_140Google ScholarCross Ref
- Gabriel Antoniu, J-F Deverge, and Sébastien Monnet. 2006. How to bring together fault tolerance and data consistency to enable grid data sharing. Concurrency and Computation: Practice and Experience 18, 13 (jan 2006), 1705–1723. https://doi.org/10.1002/cpe.1024Google ScholarCross Ref
- Adrian Asensio, Xavier Masip-Bruin, Ramón J Durán, Ignacio de Miguel, G Ren, Shahrokh Daijavad, and Admela Jukan. 2020. Designing an efficient clustering strategy for combined Fog-to-Cloud scenarios. Future Generation Computer Systems 109 (apr 2020), 392–406. https://doi.org/10.1016/j.future.2020.03.056Google ScholarCross Ref
- Michael Atighetchi and Aaron Adler. 2014. A framework for resilient remote monitoring. In Proceedings of the 7th International Symposium on Resilient Control Systems (Denver, Colorado, USA) (ISRCS). IEEE, New Jersey, USA, 1–8. https://doi.org/10.1109/ISRCS.2014.6900090Google ScholarCross Ref
- Algirdas Avižienis, J-C Laprie, Brian Randell, and Carl Landwehr. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE transactions on dependable and secure computing 1, 1 (oct 2004), 11–33. https://doi.org/10.1109/TDSC.2004.2Google ScholarDigital Library
- Hayfa Ayadi, Ahmed Zouinkhi, Boumedyen Boussaid, and M Naceur Abdelkrim. 2015. A machine learning methods: Outlier detection in WSN. In Proceedings of the 16th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (Monastir, Tunisia) (STA). IEEE, New Jersey, USA, 722–727. https://doi.org/10.1109/STA.2015.7505190Google ScholarCross Ref
- Hind Bangui, Mouzhi Ge, and Barbora Buhnova. 2022. A hybrid machine learning model for intrusion detection in VANET. Computing 104, 3 (aug 2022), 503–531. https://doi.org/10.1007/s00607-021-01001-0Google ScholarDigital Library
- Matthias Baumgart, Christian Scheideler, and Stefan Schmid. 2009. A DoS-resilient information system for dynamic data management. In Proceedings of the 21st annual symposium on Parallelism in algorithms and architectures (Calgary, Canada) (SPAA ’09). ACM, New York, USA, 300–309. https://doi.org/10.1145/1583991.1584064Google ScholarDigital Library
- Christian Berger, Philipp Eichhammer, Hans P Reiser, Jörg Domaschka, Franz J Hauck, and Gerhard Habiger. 2021. A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms. ACM Computing Surveys (CSUR) 54, 7 (sep 2021), 1–39. https://doi.org/10.1145/3462513Google ScholarDigital Library
- Guido Bertoni, Luca Breveglieri, Israel Koren, Paolo Maistri, and Vincenzo Piuri. 2002. A parity code based fault detection for an implementation of the advanced encryption standard. In Proceedings of the 17th International Symposium on Defect and Fault Tolerance in VLSI Systems (Vancouver, BC, Canada) (DFT 2002). IEEE, New Jersey, USA, 51–59. https://doi.org/10.1109/DFTVS.2002.1173501Google ScholarCross Ref
- Johannes Blömer and Jean-Pierre Seifert. 2003. Fault based cryptanalysis of the advanced encryption standard (AES). In Proceedings of the International Conference on Financial Cryptography (Grand Cayman, British West Indies) (FC 2003). Springer, Berlin, Heidelberg, 162–181. https://doi.org/10.1007/978-3-540-45126-6_12Google ScholarCross Ref
- Rakesh Bobba, Himanshu Khurana, Musab AlTurki, and Farhana Ashraf. 2009. PBES: A policy based encryption system with application to data sharing in the power grid. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (Sydney, Australia) (ASIACCS ’09). ACM, New York, USA, 262–275. https://doi.org/10.1145/1533057.1533093Google ScholarDigital Library
- Jens-Matthias Bohli, Panos Papadimitratos, Donato Verardi, and Dirk Westhoff. 2011. Resilient data aggregation for unattended WSNs. In Proceedings of the 36th Conference on Local Computer Networks (Bonn, Heidelberg) (LCN). IEEE, New Jersey, USA, 994–1002. https://doi.org/10.1109/LCN.2011.6114411Google ScholarDigital Library
- Joel W Branch, Chris Giannella, Boleslaw Szymanski, Ran Wolff, and Hillol Kargupta. 2013. In-network outlier detection in wireless sensor networks. Knowledge and information systems 34, 1 (jan 2013), 23–54. https://doi.org/10.1007/s10115-011-0474-5Google ScholarDigital Library
- Levente Buttyàn, Péter Schaffer, and István Vajda. 2007. Resilient aggregations: statistical approach. In Sensor Networks and Configuration. Springer, Heidelberg, Berlin, 211–236.Google Scholar
- Tanmoy Chakraborty, Ayushi Dalmia, Animesh Mukherjee, and Niloy Ganguly. 2017. Metrics for Community Analysis: A Survey. ACM Computing Surveys (CSUR) 50, 4 (aug 2017), 1–37. https://doi.org/10.1145/3091106Google ScholarDigital Library
- Runze Cheng, Yao Sun, Lina Mohjazi, Ying-Chang Liang, and Muhammad Ali Imran. 2022. Blockchain-Assisted Intelligent Symbiotic Radio in Space-Air-Ground Integrated Networks. https://doi.org/10.48550/arXiv.2211.05902Google ScholarCross Ref
- Yao Cheng, Elsayed A Elsayed, and Zhiyi Huang. 2022. Systems resilience assessments: a review, framework and metrics. International Journal of Production Research 60, 2 (2022), 595–622. https://doi.org/10.1080/00207543.2021.1971789Google ScholarCross Ref
- Jin-Hee Cho, Kevin Chan, and Sibel Adali. 2015. A Survey on Trust Modeling. ACM Computing Surveys (CSUR) 48, 2 (oct 2015), 1–40. https://doi.org/10.1145/2815595Google ScholarDigital Library
- Jin-Hee Cho, Ray Chen, Yating Wang, and Kevin S. Chan. 2013. Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks. In Proceedings of the International Conference on Parallel and Distributed Systems (Seoul, South Korea) (ICPADS). IEEE, New Jersey, USA, 372–379. https://doi.org/10.1109/ICPADS.2013.59Google ScholarCross Ref
- Jin-Hee Cho, Ananthram Swami, and Ing-Ray Chen. 2011. A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Communications Surveys Tutorials 13, 4 (oct 2011), 562–583. https://doi.org/10.1109/SURV.2011.092110.00088Google ScholarCross Ref
- Yung-Ting Chuang. 2017. Protecting against malicious and selective forwarding attacks for P2P search & retrieval system. Peer-to-Peer Networking and Applications 10, 4 (aug 2017), 1079–1100. https://doi.org/10.1007/s12083-016-0500-1Google ScholarCross Ref
- Timothy A Cohn, JF England, CE Berenbrock, RR Mason, JR Stedinger, and JR Lamontagne. 2013. A generalized Grubbs-Beck test statistic for detecting multiple potentially influential low outliers in flood series. Water Resources Research 49, 8 (2013), 5047–5058. https://doi.org/10.1002/wrcr.20392Google ScholarCross Ref
- Carlos Colman-Meixner, Chris Develder, Massimo Tornatore, and Biswanath Mukherjee. 2016. A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications. IEEE Communications Surveys & Tutorials 18, 3 (feb 2016), 2244–2281. https://doi.org/10.1109/COMST.2016.2531104Google ScholarDigital Library
- Mathieu Cunche, Cédric Lauradoux, Marine Minier, and Roksana Boreli. 2013. Private and resilient data aggregation. In 38th Annual IEEE Conference on Local Computer Networks (Sydney, NSW, Australia). IEEE, New Jersey, USA, 759–762. https://doi.org/10.1109/LCN.2013.6761329Google ScholarCross Ref
- Anderson Santos da Silva, Paul Smith, Andreas Mauthe, and Alberto Schaeffer-Filho. 2015. Resilience support in software-defined networking: A survey. Computer Networks 92(oct 2015), 189–207. https://doi.org/10.1016/j.comnet.2015.09.012Google ScholarDigital Library
- Emiliano De Cristofaro, Jens-Matthias Bohli, and Dirk Westhoff. 2009. FAIR: Fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks. In Proceedings of the 2nd Conference on Wireless network security (Zürich, Switzerland) (WiSec ’09). ACM, New York, USA, 253–260. https://doi.org/10.1145/1514274.1514309Google ScholarDigital Library
- Antonio Di Pietro, Stefano Panzieri, and Andrea Gasparri. 2017. Distributed data fusion for situational awareness in critical infrastructures with link failures. In Proceedings of the International Conference on Critical Infrastructure Protection (Arlington, VA, USA) (ICCIP 2017). Springer, Swiss, 99–117. https://doi.org/10.1007/978-3-319-70395-4_6Google ScholarCross Ref
- Ciprian Dobre, Florin Pop, and Valentin Cristea. 2010. A fault-tolerant approach to storing objects in distributed systems. In Proceedings of the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (Fukuoka, Japan). IEEE, New Jersey, USA, 1–8. https://doi.org/10.1109/3PGCIC.2010.7Google ScholarDigital Library
- Mahir Can Doganay, Thomas B Pedersen, Yücel Saygin, Erkay Savaş, and Albert Levi. 2008. Distributed privacy preserving k-means clustering with additive secret sharing. In Proceedings of the 2008 international workshop on Privacy and anonymity in information society (Nantes, France) (PAIS ’08). ACM, New York, USA, 3–11. https://doi.org/10.1145/1379287.1379291Google ScholarDigital Library
- Wenli Duo, MengChu Zhou, and Abdullah Abusorrah. 2022. A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges. IEEE/CAA Journal of Automatica Sinica 9, 5 (apr 2022), 784–800.Google ScholarCross Ref
- Khalil El-Khatib, Gregor v Bochmann, and Abdulmotaleb El-Saddik. 2007. A QoS-based Service Composition for Content Adaptation. In Proceedings of the 23rd International Conference on Data Engineering Workshop (Istanbul, Turkey) (ICDEW). IEEE, New Jersey, USA, 331–338. https://doi.org/10.1109/ICDEW.2007.4401013Google ScholarDigital Library
- Elena Fasolo, Michele Rossi, Jorg Widmer, and Michele Zorzi. 2007. In-network aggregation techniques for wireless sensor networks: A survey. IEEE wireless communications 14, 2 (apr 2007), 70–87. https://doi.org/10.1109/MWC.2007.358967Google ScholarDigital Library
- Paolo Ferrari, Alessandra Flammini, Emiliano Sisinni, Stefano Rinaldi, Dennis Brandão, and Murilo Silveira Rocha. 2018. Delay Estimation of Industrial IoT Applications Based on Messaging Protocols. IEEE Transactions on Instrumentation and Measurement 67, 9 (apr 2018), 2188–2199. https://doi.org/10.1109/TIM.2018.2813798Google ScholarCross Ref
- Muhammad Firdaus and Kyung-Hyune Rhee. 2021. On blockchain-enhanced secure data storage and sharing in vehicular edge computing networks. Applied Sciences 11, 1 (jan 2021), 414. https://doi.org/10.3390/app11010414Google ScholarCross Ref
- Benoit Frenay and Michel Verleysen. 2014. Classification in the Presence of Label Noise: A Survey. IEEE Transactions on Neural Networks and Learning Systems 25, 5(2014), 845–869. https://doi.org/10.1109/TNNLS.2013.2292894Google ScholarCross Ref
- Antônio Augusto Fröhlich, Roberto Milton Scheffel, David Kozhaya, and Paulo Esteves Verissimo. 2018. Byzantine resilient protocol for the IoT. IEEE Internet of Things Journal 6, 2 (sep 2018), 2506–2517. https://doi.org/10.1109/JIOT.2018.2871157Google ScholarCross Ref
- Saurabh Ganeriwal, Laura K Balzano, and Mani B Srivastava. 2008. Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks 4, 3 (jun 2008), 1–37. https://doi.org/10.1145/1362542.1362546Google ScholarDigital Library
- Timothy Thomas George and Amit Kumar Tyagi. 2022. Reliable Edge Computing Architectures for Crowdsensing Applications. In International Conference on Computer Communication and Informatics (Coimbatore, India) (ICCCI). IEEE, New Jersey, USA, 1–6. https://doi.org/10.1109/ICCCI54379.2022.9740791Google ScholarCross Ref
- Ammar Gharaibeh, Mohammad A. Salahuddin, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil, Mohsen Guizani, and Ala Al-Fuqaha. 2017. Smart Cities: A Survey on Data Management, Security, and Enabling Technologies. IEEE Communications Surveys Tutorials 19, 4 (aug 2017), 2456–2501. https://doi.org/10.1109/COMST.2017.2736886Google ScholarCross Ref
- Michelle Girvan and Mark EJ Newman. 2002. Community structure in social and biological networks. Proceedings of the national academy of sciences 99, 12 (jun 2002), 7821–7826. https://doi.org/10.1073/pnas.122653799Google ScholarCross Ref
- Andreas Gutscher. 2007. A trust model for an open, decentralized reputation system. In Proceedings of the International Conference on Trust Management (New Brunswick, Canada) (IFIPTM 2007). Springer, Boston, MA, USA, 285–300. https://doi.org/10.1007/978-0-387-73655-6_19Google ScholarCross Ref
- Simon Hawkins, Hongxing He, Graham Williams, and Rohan Baxter. 2002. Outlier Detection Using Replicator Neural Networks. In Proceedings of the International Conference on Data Warehousing and Knowledge Discovery (Aix-en-Provence, France) (DaWaK 2002). Springer, Heidelberg, Berlin, 170–180. https://doi.org/10.1007/3-540-46145-0_17Google ScholarCross Ref
- Ferry Hendrikx, Kris Bubendorfer, and Ryan Chard. 2015. Reputation systems: A survey and taxonomy. J. Parallel and Distrib. Comput. 75 (aug 2015), 184–197. https://doi.org/10.1016/j.jpdc.2014.08.004Google ScholarDigital Library
- Yaodong Huang, Xintong Song, Fan Ye, Yuanyuan Yang, and Xiaoming Li. 2019. Fair and Efficient Caching Algorithms and Strategies for Peer Data Sharing in Pervasive Edge Computing Environments. IEEE Transactions on Mobile Computing 19, 4 (feb 2019), 852–864. https://doi.org/10.1109/TMC.2019.2902090Google ScholarDigital Library
- Masayuki Ihara, Shunichi Seko, Akihiro Miyata, Ryosuke Aoki, Tatsuro Ishida, Masahiro Watanabe, Ryo Hashimoto, and Hiroshi Watanabe. 2016. Towards more practical information sharing in disaster situations. In Proceedings of the International Conference on Human Interface and the Management of Information (Toronto, Canada) (HIMI 2016). Springer, Swiss, 32–39. https://doi.org/10.1007/978-3-319-40397-7_4Google ScholarCross Ref
- SV Annlin Jeba and B Paramasivan. 2013. Energy efficient multipath data transfer scheme to mitigate false data injection attack in wireless sensor networks. Computers & Electrical Engineering 39, 6 (apr 2013), 1867–1879. https://doi.org/10.1016/j.compeleceng.2013.03.019Google ScholarDigital Library
- Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision support systems 43, 2 (2007), 618–644.Google Scholar
- Igor Kaitovic and Miroslaw Malek. 2018. Impact of Failure Prediction on Availability: Modeling and Comparative Analysis of Predictive and Reactive Methods. IEEE Transactions on Dependable and Secure Computing 17, 3 (feb 2018), 493–505. https://doi.org/10.1109/TDSC.2018.2806448Google ScholarCross Ref
- Dong-Kyun Kim, Ki-Sung Yu, Byung-Hyeon Park, and Sang-Ha Kim. 2006. Resilient data delivery in delay bounded overlay multicast. In Proceedings of the 8th International Conference Advanced Communication Technology (Gangwon-Do, South Korea) (ICACT). IEEE, New Jersey, USA, 96–101. https://doi.org/10.1109/ICACT.2006.205926Google ScholarCross Ref
- Alexander Kott and Igor Linkov. 2021. To Improve Cyber Resilience, Measure It. Computer 54, 2 (2021), 80–85. https://doi.org/10.1109/MC.2020.3038411Google ScholarDigital Library
- Gs Kunal and Doreswamy Hosahalli. 2018. Dual-Objectives Mobile-RPL Routing Protocol Based QoS Data Gathering over Low Power Lossy Networks for Smart City Applications: DMRPL. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics(Bangalore, India) (ICACCI). IEEE, New Jersey, USA, 1938–1946. https://doi.org/10.1109/ICACCI.2018.8554449Google ScholarCross Ref
- Takio Kurita, Takashi Takahashi, and Yukifumi Ikeda. 2002. A neural network classifier for occluded images. In Proceedings of the International Conference on Pattern Recognition (Quebec City, Quebec, Canada) (ICPR). IEEE, New Jersey, USA, 45–48. https://doi.org/10.1109/ICPR.2002.1047791Google ScholarCross Ref
- James Kurose and Keith Ross (Eds.). 2017. Computer Networking: A Top-Down Approach. Pearson Education, Essex, England.Google Scholar
- Nabila Labraoui, Mourad Gueroui, Makhlouf Aliouat, and Jonathan Petit. 2013. Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication systems 54, 1 (jul 2013), 3–17. https://doi.org/10.1007/s11235-013-9712-3Google ScholarCross Ref
- Jean-Claude Laprie. 1985. Dependable computing and fault-tolerance. Digest of Papers the 15th Annual International Symposium on Fault-Tolerant Computing (FTCS-15) 10, 2 (jun 1985), 124. https://doi.org/10.1109/FTCSH.1995.532603Google ScholarCross Ref
- Jean-Claude Laprie. 1992. Dependability: Basic concepts and terminology. In Dependability: Basic Concepts and Terminology. Springer, Heidelberg, Berlin, 3–245.Google ScholarCross Ref
- Jean-Claude Laprie. 2008. From dependability to resilience. In Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (Anchorage, AK, USA) (DSN 2008). IEEE, New Jersey, USA, G8–G9.Google Scholar
- Jinyang Li, John Jannotti, Douglas SJ De Couto, David R Karger, and Robert Morris. 2000. A scalable location service for geographic ad hoc routing. In Proceedings of the (Boston, MA, USA) (MobiCom ’00). ACM, New York, USA, 120–130. https://doi.org/10.1145/345910.345931Google ScholarDigital Library
- Jie Li, Ruidong Li, and Jien Kato. 2008. Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine 46, 4 (apr 2008), 108–114. https://doi.org/10.1109/MCOM.2008.4481349Google ScholarDigital Library
- Ze Li and Haiying Shen. 2009. A mobility and congestion resilient data management system for distributed mobile networks. In Proceedings of the 6th International Conference on Mobile Adhoc and Sensor Systems (Macau (S.A.R.), China) (MOBHOC). IEEE, New Jersey, USA, 60–69. https://doi.org/10.1109/MOBHOC.2009.5336942Google ScholarCross Ref
- Feng Lin, Yi Peng, Taiping Cui, Xiaoge Huang, and Qianbin Chen. 2021. Blockchain based Content Sharing Management in VANETs. In IEEE 93rd Vehicular Technology Conference (Helsinki, Finland) (VTC2021 - Spring). IEEE, New Jersey, USA, 1–5. https://doi.org/10.1109/VTC2021-Spring51267.2021.9449036Google ScholarCross Ref
- Yiran Liu, Ye Dong, Hao Wang, Han Jiang, and Qiuliang Xu. 2022. Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices. IEEE Internet of Things Journal 9, 21 (may 2022), 21025–21037. https://doi.org/10.1109/JIOT.2022.3176305Google ScholarCross Ref
- Thomas Loruenser, Andreas Happe, and Daniel Slamanig. 2015. ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing. In Proceedings of the 7th International Conference on Cloud Computing Technology and Science(Vancouver, BC, Canada) (CloudCom). IEEE, New Jersey, USA, 371–378. https://doi.org/10.1109/CloudCom.2015.71Google ScholarDigital Library
- Yong Lu and Na Sun. 2018. A resilient data aggregation method based on spatio-temporal correlation for wireless sensor networks. EURASIP Journal on Wireless Communications and Networking 2018, 1(jun 2018), 1–9. https://doi.org/10.1186/s13638-018-1173-7Google ScholarCross Ref
- Ying-Jin Lu and Jun He. 2017. Dempster-Shafer Evidence Theory and Study of Some Key Problems. Journal of Electronic Science and Technology 15, 1(2017), 106–112.Google Scholar
- Yong-Jian Luo, Xin Yang, and Xu Zhang. 2007. An Effective Resilient Data Aggregation Algorithm in Wireless Sensor Networks. In 2007 International Conference on Wireless Communications, Networking and Mobile Computing(Shanghai, China). IEEE, New Jersey, USA, 2642–2645. https://doi.org/10.1109/WICOM.2007.657Google ScholarCross Ref
- Elmer R Magsino and Ivan Wang-Hei Ho. 2022. An Enhanced Information Sharing Roadside Unit Allocation Scheme for Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems 23, 9(jan 2022), 15462–15475. https://doi.org/10.1109/TITS.2022.3140801Google ScholarDigital Library
- Dubravko Miljković. 2011. Fault detection methods: A literature survey. In Proceedings of the 34th International Convention(Opatija, Croatia) (MIPRO). IEEE, New Jersey, USA, 750–755.Google Scholar
- Franco Minucci, Evgenii Vinogradov, Hazem Sallouha, and Sofie Pollin. 2019. UAV Location Broadcasting with Wi-Fi SSID. In Proceedings of the Wireless Days (Manchester, England) (WD). IEEE, New Jersey, USA, 1–8. https://doi.org/10.1109/WD.2019.8734208Google ScholarCross Ref
- Sushruta Mishra and Hiren Thakkar. 2012. Features of WSN and Data Aggregation techniques in WSN: A Survey. International Journal of Engineering and Innovative Technology 1, 4(apr 2012), 264–273.Google Scholar
- Stuart Mitchell, Michael OSullivan, and Iain Dunning. 2011. PuLP: A linear programming toolkit for python. The University of Auckland 65 (Sept. 2011), 1–12.Google Scholar
- Raffaele Montella, Mario Ruggieri, and Sokol Kosta. 2018. A fast, secure, reliable, and resilient data transfer framework for pervasive IoT applications. In Proceedings of the Conference on Computer Communications Workshops (Honolulu, HI, USA) (INFOCOM WKSHPS). IEEE, New Jersey, USA, 710–715. https://doi.org/10.1109/INFCOMW.2018.8406884Google ScholarCross Ref
- Lik Mui, Mojdeh Mohtashemi, and Ari Halberstadt. 2002. Notions of reputation in multi-agents systems: A review. In Proceedings of the 1st international joint conference on Autonomous agents and multiagent systems: part 1(Bologna, Italy) (AAMAS ’02). ACM, New York, USA, 280–287. https://doi.org/10.1145/544741.544807Google ScholarDigital Library
- Daniele Munaretto, Chunlei An, Joerg Widmer, and Andreas Timm-Giel. 2011. Resilient data gathering and communication algorithms for emergency scenarios. Telecommunication Systems 48, 3 (may 2011), 317–327. https://doi.org/10.1007/s11235-010-9346-7Google ScholarDigital Library
- Andrea Munari, Wolfgang Schott, and Yee Wei Law. 2009. Dynamic tunnel routing for reliable and resilient data forwarding in wireless sensor networks. In IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications (Tokyo, Japan). IEEE, New Jersey, USA, 1178–1182. https://doi.org/10.1109/PIMRC.2009.5450314Google ScholarCross Ref
- Bogdan Nicolae. 2015. Leveraging Naturally Distributed Data Redundancy to Reduce Collective I/O Replication Overhead. In Proceedings of the International Parallel and Distributed Processing Symposium (Hyderabad, India) (IPDPS). IEEE, New Jersey, USA, 1023–1032. https://doi.org/10.1109/IPDPS.2015.82Google ScholarDigital Library
- Pavan Nuggehalli, Vikram Srinivasan, C-F Chiasserini, and Ramesh R Rao. 2006. Efficient Cache Placement in Multi-Hop Wireless Networks. IEEE/ACM Transactions on Networking 14, 05 (Oct. 2006), 1045–1055. https://doi.org/10.1109/TNET.2006.882863Google ScholarDigital Library
- US Department of Homeland Security. 2018. DHS Lexicon Terms and Definitions. US Department of Homeland Security. Retrieved Mar, 2022 from https://www.dhs.gov/sites/default/files/publications/18_0116_MGMT_DHS-Lexicon.pdfGoogle Scholar
- Samuel D Okegbile, Jun Cai, and Attahiru S Alfa. 2022. Practical Byzantine fault tolerance-enhanced blockchain-enabled data sharing system: Latency and age of data package analysis. IEEE Transactions on Mobile Computing - Early Access (nov 2022), 1–17. https://doi.org/10.1109/TMC.2022.3223306Google ScholarDigital Library
- Diego Ongaro and John Ousterhout. 2014. In search of an understandable consensus algorithm (extended version). In Proceedings of USENIX annual technical conference (Philadelphia, USA) (USENIX ATC). USENIX Association, Berkeley, USA, 305–319. https://www.usenix.org/conference/atc14/technical-sessions/presentation/ongaroGoogle Scholar
- Zhen Pang, Yuan Yao, Qiuyan Li, Xiaoqin Zhang, and Jing Zhang. 2022. Electronic Health Records Sharing Model Based on Blockchain With Checkable State PBFT Consensus Algorithm. IEEE Access 10(jul 2022), 87803–87815. https://doi.org/10.1109/ACCESS.2022.3186682Google ScholarCross Ref
- Yi Peng, Taiping Cui, Bin Shen, Feng Lin, Xiaoge Huang, and Qianbin Chen. 2022. Blockchain-assisted D2D Data Sharing in Fog Computing. In IEEE 95th Vehicular Technology Conference (Helsinki, Finland) (VTC2022-Spring). IEEE, New Jersey, USA, 1–5. https://doi.org/10.1109/VTC2022-Spring54318.2022.9861033Google ScholarCross Ref
- Manuel Gil Pérez, Juan E Tapiador, John A Clark, Gregorio Martínez Pérez, and Antonio F Skarmeta Gómez. 2014. Trustworthy placements: Improving quality and resilience in collaborative attack detection. Computer Networks 58(sep 2014), 70–86. https://doi.org/10.1016/j.comnet.2013.08.026Google ScholarDigital Library
- Carlos R Perez-Toro, Rajesh K Panta, and Saurabh Bagchi. 2010. RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network. In Proceedings of the 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (Boston, MA, USA) (SECON). IEEE, New Jersey, USA, 1–9. https://doi.org/10.1109/SECON.2010.5508273Google ScholarCross Ref
- Roberto Pietrantuono, Massimo Ficco, and Francesco Palmieri. 2023. Testing the Resilience of MEC-based IoT Applications Against Resource Exhaustion Attacks. Transactions on Dependable and Secure Computing Early access (2023), 1–15. https://doi.org/10.1109/TDSC.2023.3263137Google ScholarDigital Library
- Victor Prokhorenko and M Ali Babar. 2020. Architectural Resilience in Cloud, Fog and Edge Systems: A Survey. IEEE Access 8(feb 2020), 28078–28095. https://doi.org/10.1109/ACCESS.2020.2971007Google ScholarCross Ref
- Marjan Radi, Behnam Dezfouli, Kamalrulnizam Abu Bakar, and Malrey Lee. 2012. Multipath Routing in Wireless Sensor Networks: Survey and Research Challenges. Sensors 12, 1 (jan 2012), 650–685. https://doi.org/10.3390/s120100650Google ScholarCross Ref
- Jacek Rak, Magnus Jonsson, and Alexey Vinel. 2016. A taxonomy of challenges to resilient message dissemination in VANETs. In Proceedings of the 17th International Telecommunications Network Strategy and Planning Symposium (Montreal, Canada) (NETWKS). IEEE, New Jersey, USA, 127–132. https://doi.org/10.1109/NETWKS.2016.7751164Google ScholarCross Ref
- Andres J Ramirez, Betty HC Cheng, and Philip K McKinley. 2011. An evolutionary approach to network self-organization and resilient data diffusion. In Proceedings of the 5th International Conference on Self-Adaptive and Self-Organizing Systems (Ann Arbor, MI, USA) (SASO). IEEE, New Jersey, USA, 198–207. https://doi.org/10.1109/SASO.2011.31Google ScholarDigital Library
- Aida Rashidinejad, Bart Wetzels, Michel Reniers, Liyong Lin, Yuting Zhu, and Rong Su. 2019. Supervisory Control of Discrete-Event Systems under Attacks: An Overview and Outlook. In Proceedings of the 18th European Control Conference (Naples, Italy) (ECC). IEEE, New Jersey, USA, 1732–1739. https://doi.org/10.23919/ECC.2019.8795849Google ScholarCross Ref
- Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, and Fang Yu. 2003. Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. Mobile networks and applications 8, 4 (aug 2003), 427–442. https://doi.org/10.1023/A:1024591915518Google ScholarDigital Library
- Shu Qin Ren and Jong Sou Park. 2008. Density mining based resilient data aggregation for wireless sensor network. In Proceedings of the 4th International Conference on Networked Computing and Advanced Information Management (Gyeongju, South Korea) (NCM). IEEE, New Jersey, USA, 261–266. https://doi.org/10.1109/NCM.2008.92Google ScholarCross Ref
- Fernando Rosas, Kwang-Cheng Chen, and Deniz Gündüz. 2018. Social learning for resilient data fusion against data falsification attacks. Computational social networks 5, 1 (oct 2018), 1–25. https://doi.org/10.1186/s40649-018-0057-7Google ScholarCross Ref
- Sankardas Roy, Sanjeev Setia, and Sushil Jajodia. 2006. Attack-resilient hierarchical data aggregation in sensor networks. In Proceedings of the 4th ACM workshop on Security of ad hoc and sensor networks (Alexandria, VA, USA) (SASN ’06). ACM, New York, USA, 71–82. https://doi.org/10.1145/1180345.1180355Google ScholarDigital Library
- Utsa Roy, Satyaki Roy, Rajshekhar Khan, Preetam Ghosh, and Nirnay Ghosh. 2022. MCR: A Motif Centrality-Based Distributed Message Routing for Disaster Area Networks. IEEE Internet of Things Journal 9, 24 (aug 2022), 25337–25349. https://doi.org/10.1109/JIOT.2022.3196150Google ScholarCross Ref
- Sini Ruohomaa, Lea Kutvonen, and Eleni Koutrouli. 2007. Reputation Management Survey. In Proceedings of the 2nd International Conference on Availability, Reliability and Security (Vienna, Austria) (ARES’07). IEEE, New Jersey, USA, 103–111. https://doi.org/10.1109/ARES.2007.123Google ScholarDigital Library
- Jordi Sabater and Carles Sierra. 2001. REGRET: Reputation in gregarious societies. In Proceedings of the 5th international conference on Autonomous agents (Montreal, Canada) (AGENTS ’01). ACM, New York, NY, USA, 194–195. https://doi.org/10.1145/375735.376110Google ScholarDigital Library
- Iman Dakhil Idan Saeedi and Ali Kadhum M Al-Qurabat. 2021. A Systematic Review of Data Aggregation Techniques in Wireless Sensor Networks. In Proceedings of the Iraqi Academics Syndicate International Conference for Pure and Applied Sciences (Babylon, Iraq) (IICPS). IOP Publishing Ltd, Bristol, UK, 012194–012208. https://doi.org/10.1088/1742-6596/1818/1/012194Google ScholarCross Ref
- S Kokilavani Sankaralingam, N Sathishkumar Nagarajan, and AS Narmadha. 2020. Energy aware decision stump linear programming boosting node classification based data aggregation in WSN. Computer Communications 155 (mar 2020), 133–142. https://doi.org/10.1016/j.comcom.2020.02.062Google ScholarCross Ref
- Arman Sargolzaei, Kang K Yen, Mohamed N Abdelghani, Saman Sargolzaei, and Bogdan Carbunar. 2017. Resilient Design of Networked Control Systems Under Time Delay Switch Attacks, Application in Smart Grid. IEEE Access 5(jul 2017), 15901–15912. https://doi.org/10.1109/ACCESS.2017.2731780Google ScholarCross Ref
- Thomas Schmitt. 2022. The ONE - The Opportunistic Network Environment simulator. Ari Keränen. Retrieved Jan, 2022 from https://akeranen.github.io/the-one/Google Scholar
- Martín Serrano, Steven Davy, Martin Johnsson, Willie Donnelly, and Alex Galis. 2011. Review and Designs of Federated Management in Future Internet Architectures. In Proceedings of the Future Internet Assembly (Budapest, Hungary) (FIA 2011). Springer, Heidelberg, Berlin, 51–66. https://doi.org/10.1007/978-3-642-20898-0_4Google ScholarCross Ref
- Daniel Seybold, Simon Volpert, Stefan Wesner, André Bauer, Nikolas Herbst, and Jörg Domaschka. 2019. Kaa: Evaluating Elasticity of Cloud-Hosted DBMS. In Proceedings of the International Conference on Cloud Computing Technology and Science (Sydney, Australia) (CloudCom). IEEE, New Jersey, USA, 54–61. https://doi.org/10.1109/CloudCom.2019.00020Google ScholarCross Ref
- Sujie Shao, Weichao Gong, Huifeng Yang, Shaoyong Guo, Liandong Chen, and Ao Xiong. 2021. Data Trusted Sharing Delivery: A blockchain assisted software-defined content delivery network. IEEE Internet of Things Journal 10, 14 (oct 2021), 11949–11959. https://doi.org/10.1109/JIOT.2021.3124091Google ScholarCross Ref
- Sanaa Sharafeddine and Omar Farhat. 2018. A proactive scalable approach for reliable cluster formation in wireless networks with D2D offloading. Ad Hoc Networks 77(apr 2018), 42–53. https://doi.org/10.1016/j.adhoc.2018.04.010Google ScholarCross Ref
- Haiying Shen, Ze Li, and Kang Chen. 2013. A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks. IEEE Transactions on Parallel and Distributed Systems 25, 5 (jul 2013), 1124–1134. https://doi.org/10.1109/TPDS.2013.174Google ScholarDigital Library
- Chi-Sheng Shih, Pi-Cheng Hsiu, Yuan-Hao Chang, and Tei-Wei Kuo. 2016. Framework designs to enhance reliable and timely services of disaster management systems. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (Austin, Texas, USA) (ICCAD). IEEE, New Jersey, USA, 1–8. https://doi.org/10.1145/2966986.2980090Google ScholarDigital Library
- SG Shilpa and S Meenakshi Sundaram. 2017. Data Aggregation Techniques Over Wireless Sensor Network - A Review. Proceedings of the National Conference on Image Processing, Computing, Communication, Networking and Data Analytics (NCICCNDA) 5, 22 (apr 2017), 904. https://doi.org/10.17577/IJERTCONV5IS22016Google ScholarCross Ref
- Roshan Singh and Sukumar Nandi. 2023. An Improved PBFT-Based Consensus Protocol for Industrial IoT. In IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (Bangalore, India) (CCGridW). IEEE, New Jersey, USA, 311–312. https://doi.org/10.1109/CCGridW59191.2023.00068Google ScholarCross Ref
- Zichao Song, Tanping Zhou, Weidong Zhong, Dong Chen, Longfei Liu, and Xiaoyuan Yang. 2023. Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid. IEEE Access 11(ul 2023), 2169–3536. https://doi.org/10.1109/ACCESS.2023.3292586Google ScholarCross Ref
- Vasilis Sourlas, Onur Ascigil, Ioannis Psaras, and George Pavlou. 2018. Enhancing Information Resilience in Disruptive Information-Centric Networks. IEEE Transactions on Network and Service Management 15, 2 (mar 2018), 746–760. https://doi.org/10.1109/TNSM.2018.2811944Google ScholarDigital Library
- Cledson Sousa, Ricardo C Carrano, Luiz CS Magalhaes, and Célio VN Albuquerque. 2014. STELE: A Simple Technique for Local delay Estimation in WSN. In Proceedings of the Symposium on Computers and Communications (Funchal, Madeira, Portugal) (ISCC). IEEE, New Jersey, USA, 1–6. https://doi.org/10.1109/ISCC.2014.6912533Google ScholarCross Ref
- James PG Sterbenz, David Hutchison, Egemen K Çetinkaya, Abdul Jabbar, Justin P Rohrer, Marcus Schöller, and Paul Smith. 2010. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Computer networks 54, 8 (mar 2010), 1245–1265. https://doi.org/10.1016/j.comnet.2010.03.005Google ScholarDigital Library
- Tim Stobierski. 2019. What is Statistical Modeling For Data Analysis?Northeastern University. Retrieved Jan, 2022 from https://www.northeastern.edu/graduate/blog/statistical-modeling-for-data-analysisGoogle Scholar
- Irshad Ahmed Sumra, Halabi Bin Hasbullah, and Jamalul-lail Bin AbManan. 2015. Attacks on security goals (confidentiality, integrity, availability) in VANET: A survey. In Vehicular Ad-Hoc Networks for Smart Cities. Springer, Heidelberg, Berlin, 51–61.Google Scholar
- Jihoon Sung, Minseok Kim, Kyongchun Lim, and June-Koo Kevin Rhee. 2016. Efficient Cache Placement Strategy in Two-Tier Wireless Content Delivery Network. IEEE Transactions on Multimedia 18, 6 (2016), 1163–1174. https://doi.org/10.1109/TMM.2016.2543658Google ScholarDigital Library
- Mohammed Tarique, Kemal E Tepe, Sasan Adibi, and Shervin Erfani. 2009. Survey of multipath routing protocols for mobile ad hoc networks. Journal of Network and computer applications 32, 6 (jul 2009), 1125–1143. https://doi.org/10.1016/j.jnca.2009.07.002Google ScholarDigital Library
- Michel Toulouse, Hai Le, Cao Vien Phung, and Denis Hock. 2017. Defense strategies against byzantine attacks in a consensus-based network intrusion detection system. Informatica - An International Journal of Computing and Informatics 41, 2(jun 2017), 1–16.Google Scholar
- Christos Tsigkanos, Stefan Nastic, and Schahram Dustdar. 2019. Towards Resilient Internet of Things: Vision, Challenges, and Research Roadmap. In Proceedings of the (Dallas, Texas, USA) (ICDCS). IEEE, New Jersey, USA, 1754–1764. https://doi.org/10.1109/ICDCS.2019.00174Google ScholarCross Ref
- Rao M. Venkateswara and Srinivas Malladi. 2021. Secure Intruder Information Sharing in Wireless Sensor Network for Attack Resilient Routing. International Journal of Advanced Computer Science and Applications 12 (2021), 504–510. https://doi.org/10.14569/IJACSA.2021.0120263Google ScholarCross Ref
- D.C. Verma. 2004. Service level agreements on IP networks. Proc. IEEE 92, 9 (aug 2004), 1382–1388. https://doi.org/10.1109/JPROC.2004.832969Google ScholarCross Ref
- N Vijayarani and A Senthilkumar. 2017. Multipath Routing Protocols in Wireless Sensor Networks: A Retrospective Review. Indian Journal of Science and Technology 10, 1 (apr 2017), 1–9. https://doi.org/10.17485/ijst/2017/v10i17/106581Google ScholarCross Ref
- Eric D Vugrin, Drake E Warren, and Mark A Ehlen. 2011. A resilience assessment framework for infrastructure and economic systems: Quantitative and qualitative resilience analysis of petrochemical supply chains to a hurricane. Process Safety Progress 30, 3 (mar 2011), 280–290. https://doi.org/10.1002/prs.10437Google ScholarCross Ref
- Marko Vukolić. 2016. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. In Open Problems in Network Security: International Workshop (Zurich, Switzerland) (iNetSec 2015). Springer, Berlin, Heidelberg, 112–125. https://doi.org/10.1007/978-3-319-39028-4_9Google ScholarDigital Library
- Xinlei Wang, Kannan Govindan, and Prasant Mohapatra. 2011. Collusion-resilient quality of information evaluation based on information provenance. In Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks(Salt Lake City, UT, USA) (SAHCN). IEEE, New Jersey, USA, 395–403. https://doi.org/10.1109/SAHCN.2011.5984923Google ScholarCross Ref
- Thomas Welsh and Elhadj Benkhelifa. 2017. Perspectives on Resilience in Cloud Computing: Review and Trends. In Proceedings of the 14th International Conference on Computer Systems and Applications (Hammamet, Tunisia) (AICCSA). IEEE, New Jersey, USA, 696–703. https://doi.org/10.1109/AICCSA.2017.221Google ScholarCross Ref
- Thomas Welsh and Elhadj Benkhelifa. 2020. On Resilience in Cloud Computing: A Survey of Techniques across the Cloud Domain. Comput. Surveys 53, 3 (may 2020), 1–36. https://doi.org/10.1145/3388922Google ScholarDigital Library
- T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, JP. Vasseur, and R. Alexander. 2012. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550. Internet Engineering Task Force (IETF). http://www.rfc-editor.org/rfc/rfc6550.txtGoogle ScholarDigital Library
- Kun Wu. 2023. Optimizing Consensus Protocols with Machine Learning Models: A cache-based approach. Master’s Thesis. KTH Royal Institute Of Technology, Stockholm, Sweden.Google Scholar
- Liqiang Wu, Ming Xu, Shaojing Fu, Yuchuan Luo, and Yuechuan Wei. 2021. FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid. IEEE Internet of Things Journal 9, 7 (aug 2021), 5254–5265. https://doi.org/10.1109/JIOT.2021.3109153Google ScholarCross Ref
- Xin Xu, Haitao Zhang, Tianxiang Li, and Lixia Zhang. 2018. Achieving resilient data availability in wireless sensor networks. In Proceedings of the International Conference on Communications Workshops (Kansas City, MO, USA) (ICC Workshops). IEEE, New Jersey, USA, 1–6. https://doi.org/10.1109/ICCW.2018.8403581Google ScholarCross Ref
- Xin Yang, Ruo-Peng Yang, and Dong-Dong Wu. 2016. A Resilient Data Fusion Algorithm in Wireless Sensor Networks. In 2016 International Conference on Information System and Artificial Intelligence (ISAI). IEEE, New Jersey, USA, 192–195. https://doi.org/10.1109/ISAI.2016.0049Google ScholarCross Ref
- Bruno Bogaz Zarpelão, Rodrigo Sanches Miani, Cláudio Toshio Kawakani, and Sean Carlisto de Alvarenga. 2017. A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications 84 (feb 2017), 25–37. https://doi.org/10.1016/j.jnca.2017.02.009Google ScholarDigital Library
- Xinhua Zhang, Lin You, and Gengran Hu. 2022. An Efficient and Robust Multidimensional Data Aggregation Scheme for Smart Grid Based on Blockchain. IEEE Transactions on Network and Service Management 19, 4 (oct 2022), 3949–3959. https://doi.org/10.1109/TNSM.2022.3217312Google ScholarCross Ref
- Xian-Ming Zhang, Qing-Long Han, Xiaohua Ge, Derui Ding, Lei Ding, Dong Yue, and Chen Peng. 2020. Networked control systems: A survey of trends and techniques. IEEE/CAA Journal of Automatica Sinica 7, 1 (Jan. 2020), 1–17. https://doi.org/10.1109/JAS.2019.1911651Google ScholarCross Ref
- Charikleia Zouridaki, Brian L Mark, Marek Hejmo, and Roshan K Thomas. 2009. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks. Ad Hoc Networks 7, 6 (oct 2009), 1156–1168. https://doi.org/10.1016/j.adhoc.2008.10.003Google ScholarDigital Library
Index Terms
- A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques
Recommendations
Metrics for Ensuring Security and Privacy of Information Sharing Platforms for Improved City Resilience: A Review Approach
City resilience is a pressing issue worldwide since the majority of the population resides in urban areas. When disaster strikes, the consequences will be more severe in the cities. To achieve resilience, different organizations, agencies and the public ...
A Survey on Resilience in the IoT: Taxonomy, Classification, and Discussion of Resilience Mechanisms
Internet-of-Things (IoT) ecosystems tend to grow both in scale and complexity, as they consist of a variety of heterogeneous devices that span over multiple architectural IoT layers (e.g., cloud, edge, sensors). Further, IoT systems increasingly demand ...
Information sharing and the impact of shutdown policy in a supply chain with market disruption risk in the social media era
AbstractThis paper investigates the information sharing issue in a simple supply chain with one manufacturer and one retailer. The market demand might be subject to disruption, but the retailer can get access to some signals from social media ...
Comments