2019
DOI: 10.1109/jiot.2018.2871157
|View full text |Cite
|
Sign up to set email alerts
|

Byzantine Resilient Protocol for the IoT

Abstract: Wireless sensor networks, often adhering to a single gateway architecture, constitute the communication backbone for many modern cyber-physical systems. Consequently, faulttolerance in CPS becomes a challenging task, especially when accounting for failures (potentially malicious) that incapacitate the gateway or disrupt the nodes-gateway communication, not to mention the energy, timeliness, and security constraints demanded by CPS domains. This paper aims at ameliorating the fault-tolerance of WSN based CPS to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…The scenarios represent different aspects of Wireless CPS deployment, such as node distances and placements, based on monitoring environments and industry floor. The scenarios are similar to the ones used in other works [16][17][18]. Scenario 1 represents a typical monitoring environment, like a solar field monitoring or a soil moisture irrigation system.…”
Section: Methodsmentioning
confidence: 99%
“…The scenarios represent different aspects of Wireless CPS deployment, such as node distances and placements, based on monitoring environments and industry floor. The scenarios are similar to the ones used in other works [16][17][18]. Scenario 1 represents a typical monitoring environment, like a solar field monitoring or a soil moisture irrigation system.…”
Section: Methodsmentioning
confidence: 99%
“…In a data-driven economy, WSN privacy must be ensured [127]. WSNs must confront these privacy attacks that arise from the spoofing of identity, the examination of traffic and routing data, and attacks on reliability assurance, such as the Byzantine routing data attack and modification attacks [128]. Information reliability in a centralized WSN configuration is challenging in applications where decisions are based on the received information due to possible injection attacks, resulting in information modification, downtime, and information stealing.…”
Section: Security Problems Of Centralized Wsn Modelsmentioning
confidence: 99%
“…The Fault-Tolerant Trustful Space-Time Protocol (FT -TSTP) (Fröhlich et al 2019;Scheffel and Fröhlich 2018a) transports data from devices (e.g. sensors, actuators, machines) to multiple gateways connected to an IT infrastructure.…”
Section: Ft-tstpmentioning
confidence: 99%