将区块链技术和车联网(internet of vehicles, IOV)技术相结合,提出一种基于惩罚机制的Gossip认证算法。采用窗口保护机制控制网络中节点的数量,避免因网络通道阻塞破坏共识信息的达成。利用Gossip协议保证信息高效传播,并提出惩罚机制...将区块链技术和车联网(internet of vehicles, IOV)技术相结合,提出一种基于惩罚机制的Gossip认证算法。采用窗口保护机制控制网络中节点的数量,避免因网络通道阻塞破坏共识信息的达成。利用Gossip协议保证信息高效传播,并提出惩罚机制降低共识过程中恶意节点的数量。算法分析和试验结果表明,该方法在保证通信安全的同时可以提高节点的共识效率,并有效弥补车联网中身份认证方面的缺陷。展开更多
Many advances have been made in sensor technologies which are as varied as the applications;and many more are in progress. It has been reasonable to design and develop small size sensor nodes of low cost and low power...Many advances have been made in sensor technologies which are as varied as the applications;and many more are in progress. It has been reasonable to design and develop small size sensor nodes of low cost and low power. In this work, we have explored some energy-efficient routing protocols (LEACH, Directed Diffusion, Gossiping and EESR) and their expansions (enhancements), and furthermore, their tactics specific to wireless sensor network, such as data aggregation and in-network processing, clustering, different node role assignment, and data-centric methods. After that we have compared these explored routing protocols based on different metrics that affect the specific application requirements and WSN in general.展开更多
文摘将区块链技术和车联网(internet of vehicles, IOV)技术相结合,提出一种基于惩罚机制的Gossip认证算法。采用窗口保护机制控制网络中节点的数量,避免因网络通道阻塞破坏共识信息的达成。利用Gossip协议保证信息高效传播,并提出惩罚机制降低共识过程中恶意节点的数量。算法分析和试验结果表明,该方法在保证通信安全的同时可以提高节点的共识效率,并有效弥补车联网中身份认证方面的缺陷。
文摘Many advances have been made in sensor technologies which are as varied as the applications;and many more are in progress. It has been reasonable to design and develop small size sensor nodes of low cost and low power. In this work, we have explored some energy-efficient routing protocols (LEACH, Directed Diffusion, Gossiping and EESR) and their expansions (enhancements), and furthermore, their tactics specific to wireless sensor network, such as data aggregation and in-network processing, clustering, different node role assignment, and data-centric methods. After that we have compared these explored routing protocols based on different metrics that affect the specific application requirements and WSN in general.