2020
DOI: 10.48550/arxiv.2005.07778
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Access Control for Distributed Ledgers in the Internet of Things: A Networking Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(25 citation statements)
references
References 0 publications
0
25
0
Order By: Relevance
“…Specifically, the NANO ledger was subjected to attacks that could have been prevented by incorporating an appropriately designed access control mechanism 4 . Indeed, the motivation for this present paper is the proposed IOTA access control algorithm [10] and the need to make this module robust against certain types of adversarial attacks. In terms of connection to traditional networking work, our work builds heavily on some of the most mature work in this area, with the caveat that algorithm design is revisited from the perspective of operation in adversarial environments, That said, much of the work reported in this paper builds on traditional scheduling algorithms such as Defecit Round Robin (DRR), and flow based access control, such as the Additive-Increase Multiplicative-Decrease (AIMD) algorithm [37].…”
Section: Comments On Prior Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Specifically, the NANO ledger was subjected to attacks that could have been prevented by incorporating an appropriately designed access control mechanism 4 . Indeed, the motivation for this present paper is the proposed IOTA access control algorithm [10] and the need to make this module robust against certain types of adversarial attacks. In terms of connection to traditional networking work, our work builds heavily on some of the most mature work in this area, with the caveat that algorithm design is revisited from the perspective of operation in adversarial environments, That said, much of the work reported in this paper builds on traditional scheduling algorithms such as Defecit Round Robin (DRR), and flow based access control, such as the Additive-Increase Multiplicative-Decrease (AIMD) algorithm [37].…”
Section: Comments On Prior Workmentioning
confidence: 99%
“…In line with [10], we describe here the main components of the protocol (more information can be found later in the section).…”
Section: B Dag-based Dltmentioning
confidence: 99%
See 3 more Smart Citations