2020
DOI: 10.1109/access.2020.3027150
|View full text |Cite
|
Sign up to set email alerts
|

Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

Abstract: This article is based upon work from COST Action CA15127 ("Resilient communication services protecting end-user applications from disaster-based failures-RECODIS") supported by COST (European Cooperation in Science and Technology) [4].

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 73 publications
0
5
0
Order By: Relevance
“…As stated above, in this paper we do not consider direct threat to the whole P2P communication channel and, therefore, we do not deal with this aspect. However, as stated above, the recent scientific literature report several solutions to DoS attacks [61]- [63]. Any of them could be integrated in our approach, thus making it robust also to full DoS attacks.…”
Section: Sp2 -Resistance To Package Correlation Attacksmentioning
confidence: 92%
See 1 more Smart Citation
“…As stated above, in this paper we do not consider direct threat to the whole P2P communication channel and, therefore, we do not deal with this aspect. However, as stated above, the recent scientific literature report several solutions to DoS attacks [61]- [63]. Any of them could be integrated in our approach, thus making it robust also to full DoS attacks.…”
Section: Sp2 -Resistance To Package Correlation Attacksmentioning
confidence: 92%
“…In addition, our approach focuses on the protection against privacy leakages deriving from the availability of access log information from a video surveillance based access monitoring system, therefore we do not consider direct threats to the P2P communication channel, such as DoS attacks [60]. Anyway, these menaces are thoroughly studied in the scientific literature and, therefore, even if the identification of suitable strategies for the protection from them is orthogonal to our solution, it is possible to leverage any available solution already proposed in the literature to make our approach robust also against these kinds of attack [61]- [63].…”
Section: A Attack Modelmentioning
confidence: 99%
“…Authors in. [178] presented a secure and inexpensive gossiping method enabled by reinforcement learning and game theory to mitigate the communication losses usually occurring in disaster scenarios. Simulation experiments validated the benefits of this approach, compared to other schemes from the literature, in terms of overhead, latency, reliability, security, and energy efficiency.…”
Section: A Modulation and Coding Schemesmentioning
confidence: 99%
“…Unfortunately, this area has not been strongly tackled by recent works 2 , but nonetheless insightful considerations have been presented for general applications. For instance, Reference [157] presents a secure and inexpensive gossiping method enabled by reinforcement learning and game theory to mitigate the communication losses usually occurring in disaster scenarios. Simulation experiments validated the benefits of this approach, compared to other schemes from the literature, in terms of overhead, latency, reliability, security, and energy efficiency.…”
Section: A Modulation and Coding Schemesmentioning
confidence: 99%