Skip to content Skip to navigation
University of Warwick
  • Study
  • |
  • Research
  • |
  • Business
  • |
  • Alumni
  • |
  • News
  • |
  • About

University of Warwick
Publications service & WRAP

Highlight your research

  • WRAP
    • Home
    • Search WRAP
    • Browse by Warwick Author
    • Browse WRAP by Year
    • Browse WRAP by Subject
    • Browse WRAP by Department
    • Browse WRAP by Funder
    • Browse Theses by Department
  • Publications Service
    • Home
    • Search Publications Service
    • Browse by Warwick Author
    • Browse Publications service by Year
    • Browse Publications service by Subject
    • Browse Publications service by Department
    • Browse Publications service by Funder
  • Help & Advice
University of Warwick

The Library

  • Login
  • Admin

Reliable logging in wireless IoT networks in the presence of Byzantine faults

Tools
- Tools
+ Tools

Alhajaili, Sara and Jhumka, Arshad (2022) Reliable logging in wireless IoT networks in the presence of Byzantine faults. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20-22 Oct 2021. Published in: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) pp. 17-25. doi:10.1109/TrustCom53373.2021.00021

Research output not available from this repository.

Request-a-Copy directly from author or use local Library Get it For Me service.

Official URL: http://dx.doi.org/10.1109/TrustCom53373.2021.00021

Request Changes to record.

Abstract

Wireless IoT networks are becoming increasingly prevalent for sensing and actuating in a range of sophisticated applications, such as smart homes and smart cities. For various reasons, including auditability, debugging and performance tracking, event logging is essential in such networks. However, most current research has assumed that nodes always behave correctly. Yet, nodes in open IoT networks may misbehave due to the presence of attackers. Hence, an understanding of the problem of event logging in the presence of Byzantine nodes is essential. In this paper, we propose two versions of event logging: strong and weak logging. We show a number of impossibility results and propose a distributed and centralised version of the weak event logging. We show that only a weak logging can be achieved probabilistically, and we propose, and prove correct, an algorithm to solve the problem.

Item Type: Conference Item (Paper)
Divisions: Faculty of Science, Engineering and Medicine > Science > Computer Science
Journal or Publication Title: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Book Title: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Official Date: 9 March 2022
Dates:
DateEvent
9 March 2022Published
Page Range: pp. 17-25
DOI: 10.1109/TrustCom53373.2021.00021
Status: Peer Reviewed
Publication Status: Published
Access rights to Published version: Restricted or Subscription Access
Conference Paper Type: Paper
Title of Event: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
Type of Event: Conference
Location of Event: Shenyang, China
Date(s) of Event: 20-22 Oct 2021

Request changes or add full text files to a record

Repository staff actions (login required)

View Item View Item
twitter

Email us: wrap@warwick.ac.uk
Contact Details
About Us