Advanced searches left 3/3

Protocol - Arxiv

Summarized by Plex Scholar
Last Updated: 24 July 2022

* If you want to update the article please login/register

An Evolutionary Game based Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Wireless Sensor Networks

Firstly, a fuzzy trust evaluation system is used to transform the transmission evidence into trust values while still removing trust mistrust. And then, a K-Means based outlier detection system is designed to further investigate several trust metrics obtained by fuzzy trust assessment or trust recommendation. When choosing the cluster heads, we recommend an evolutionary game-based secure clustering scheme to achieve a trade-off between security protection and electricity saving for sensor nodes. By isolating the suspicious nodes, a sensor node that failed to be the cluster head can safely choose its own head.

Source link: https://arxiv.org/abs/2207.10282v1


A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks

Security is one of the top issues in Industrial Wireless Sensor Networks. The malicious nodes are not cluster leaders, and then a density-based outlier detection scheme is introduced to produce an adaptive trust threshold that can distinguish the malicious nodes from being cluster heads. Eventually, a fuzzy based cluster heads election scheme has been suggested to strike a balance between energy conservation and security assurance, so that a normal sensor node with more residual energy or less confidence on other nodes has a greater chance of being the cluster leader.

Source link: https://arxiv.org/abs/2207.09936v1


PFMC: a parallel symbolic model checker for security protocol verification

We present an investigation into the construction and implementation of a parallel model of the enemy, where instantiation of concrete terms and messages are skipped until it is required to resolve a particular claim. For both the Dolev-Yao attacker model and more general algebraic attacker models, we find that moving from the original single-threaded installation of OFMC to our multi-threaded version is a significant increase of about 3-5 times improvement.

Source link: https://arxiv.org/abs/2207.09895v1


Towards a Game-Theoretic Security Analysis of Off-Chain Protocols

The main idea is to allow parties to transact on-chain only after they have agreed to form a channel between them, and later on the resulting channel paths to conduct arbitrarily many peer-to-peer transactions off-chain. We take the first step toward a principled game-theoretic security investigation of off-chain protocols by introducing the first game-theoretic model that is clear enough to warrant questions regarding their protection.

Source link: https://arxiv.org/abs/2109.07429v2


Quantum protocol for electronic voting without election authorities

Here we demonstrate a quantum protocol that uses untrue source of multipartite entanglement to run an election without relying on election officials, simultaneous broadcasting, or computational assumptions, and whose conclusion is publicly verifiable.

Source link: https://arxiv.org/abs/2107.14719v2


Benchmarking of Quantum Protocols

Quantum money, W-state based anonymous transmission, verifiable blind quantum estimation, and quantum digital signature were all selected from both quantum computation and quantum computation as follows: quantum money, quantum money, quantum computation, and quantum computation. To enable quantum money protocol, the decoherence time constant of the quantum memory must be at least three times faster than qubit storage time. In addition, our simulation findings for the w-state-based anonymous transmission protocol showed that to achieve an average fidelity above 0. 8 percent, the storage time of sender's and receiver's particles in the quantum memory must be less than half of the quantum memory's decoherence time constant. We also investigated the effects of gate imperfections on the success of verifiable blind quantum computation, which has also been investigated. Lastly, our simulation results for quantum digital signature protocol show that channel loss has a significant effect on the likelihood of repudiation.

Source link: https://arxiv.org/abs/2111.02527v2


Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates

This paper explores the challenge of gathering multidimensional data over time for the essential job of frequency estimation under Local Differential Privacy guarantees. Both longitudinal and multidimensional data sets were used to explore these issues. To address these challenges, we extend the review of three state-of-the-art LDP protocols. We empirically and experimentally show that beginning with OUE and SUE for two rounds of sanitization, i. e. , L-OUE and L-SUE, respectively, show that starting with OUE and then with SUE yields greater data utility. Also, for attributes with small domain sizes, we recommend Longitudinal GRR, which offers more functionality than other protocols based on unary encoding. We also recommend Adaptive LDP for LOngitudinal and Multidimensional FREquency Estimates, which randomly samples a single feature to be sent with the whole privacy budget and then selects the most appropriate protocol, i. e. , either L-GRR or L-OSUE.

Source link: https://arxiv.org/abs/2111.04636v3


A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra Problem

The protocol runs in the Arithmetic Black Box model on top of the graph's separator tree, resulting in faster time complexity when the graph's subgraphs have small separators; the achievable parallelism is much higher than that of classical SSSD algorithms applied on top of an ABB.

Source link: https://arxiv.org/abs/2207.07964v1


Multidimensional entropic bound: Estimator of entropy production for general Langevin dynamics with an arbitrary time-dependent protocol

MEB is a unified system in the sense that it can be used to both overdamped and underdamped Langevin cycles, regardless of the time dependence of the driving protocol. A dragged Brownian particle, a string pulling process of a harmonic chain, and unfolding process of an RNA hairpin are all examples of experiments using optical tweezers.

Source link: https://arxiv.org/abs/2207.05961v1


DWTCP: Ultra Low Latency Congestion Control Protocol for Data Centers

To achieve rapid convergence, high utilization, and fairness among flows, Congestion control algorithms rely on a variety of congestion signals. Without significant overheads, an effective congestion management system must determine any available bandwidth in the network, detect congestion as soon as link utilization hits full capacity, and react promptly to prevent queuing and packet drops without significant overheads. The main point here is that as the high priority queue becomes busier, the low priority queue is cleared less. We recommend a new transport protocol, Double-Window Transmission Control Protocol, which expands on the Scout service's ability to dynamically adjust its congestion window.

Source link: https://arxiv.org/abs/2207.05624v1

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions

* Please keep in mind that all text is summarized by machine, we do not bear any responsibility, and you should always check original source before taking any actions