نتایج جستجو برای: byzantine attack

تعداد نتایج: 83821  

Journal: :International Journal of Computer Applications 2015

Journal: :International Journal of Computer Applications 2014

2015

One of the research issues in Wireless Sensor Networks (WSNs) is how to efficiently organize sensors to cover an area. A byzantine attack in wireless SEnsor Networks with Mobile Access (SENMA) points is deliberated. One effective method to fight with Byzantine attacks is the qout-of-m scheme. Byzantine sensors that reduce the detection error exponent are achieved using a “WaterFilling” procedur...

2004
Rodrigo Rodrigues Barbara Liskov

Byzantine fault tolerance comprises a set of techniques for building fault-tolerant systems where no assumptions are made about the behavior of faulty nodes. This makes Byzantine-fault-tolerant systems particularly attractive as a defense against malicious attacks that may cause faulty nodes to exhibit arbitrary behavior. A service that tolerates Byzantine failures (e.g., [1, 8]) must store the...

Journal: :CoRR 2017
Ruohan Cao

This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay network, where an amplify-and-forward relay may perform Byzantine attacks by forwarding altered symbols to the destination. For facilitating attack detection, we utilize the openness of wireless medium to make the destination observe some secured signals that are not attacked. Then, a detection scheme is develop...

2003
Baruch Awerbuch David Holmer Herbert Rubens

An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermediary nodes. Routing in ad hoc networks is a challenging problem as a result of highly dynamic topology as well as bandwidth and energy constraints. The Swarm Intelligence paradigm has recently been demonstrated as an effective appr...

2017
Harsh Pratap Singh Rashmi Singh Abderrahmane Baadache Ali Belmehdi Nital Mistry Devesh C. Jinwala Mukesh Zaveri Payal N. Raj Prashant B. Swadas

Mobile ad hoc network (MANETs) is an infrastructureless/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block ...

2017
Harsh Pratap Singh Rashmi Singh

Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block...

2017
Peva Blanchard El Mahdi El Mhamdi Rachid Guerraoui Julien Stainer

We report on Krum, the rst provably Byzantine-tolerant aggregation rule for distributed Stochastic Gradient Descent (SGD). Krum guarantees the convergence of SGD even in a distributed setting where (asymptotically) up to half of the workers can be malicious adversaries trying to attack the learning system.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید