Abstract
The methods of protection against attacks on the ad hoc networks in the self-organizing cyber-physical systems are analyzed in the article, and their issues are identified. The authors propose an adaptive management method for the ad hoc network topology, where the blockchain-like directed acyclic graph is applied to solve the identified issues.
Similar content being viewed by others
REFERENCES
Bhattacharyya, A., Banerjee, A., Bose, D., Saha, H.N., and Bhattacharjee, D., Different types of attacks in Mobile ADHOC Network: Prevention and mitigation techniques, arXiv, 2011. https://arxiv.org/ pdf/1111.4090.pdf. Accessed May 23, 2017.
Karlf, C. and Wagner, D., Secure routing in wireless sensor networks: Attacks and countermeasures, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 113–127.
Wu, B., Chen, J., Wu, J., and Cardei, M., A survey on attacks and countermeasures in mobile ad hoc networks, Wireless Network Secur., 2007, pp. 103–135.
Coltun, R., Ferguson, D., Moy, J., and Lindem, A., RFC 5340. OSPF for IPv6, IETF Tools, 2008. https://tools.ietf.org/html/rfc5340. Accessed May 23, 2017.
Ogier, R. and Spagnolo, P., RFC 5614. Mobile Ad Hoc Network (MANET) Extension of OSPF Using Connected Dominating Set (CDS) Flooding, IETF Tools, 2009. https://tools.ietf.org/html/rfc5614. Accessed May 23, 2017.
Popov, S., The tangle, in IOTA: Next Generation Blockchain, 2017. https://www.iotatoken.com/IOTA_Whitepaper.pdf. Accessed April 20, 2018.
ACKNOWLEDGMENTS
This work was funded by a grant of the President of the Russian Federation for State Support of Leading Scientific Schools of the Russian Federation NSh-2992.2018.9, contract no. 14. Y31.18.2992-NSh dated January 17, 2018.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Translated by Yu. Bezlepkina
About this article
Cite this article
Busygin, A.G., Konoplev, A.S. & Zegzhda, D.P. Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph. Aut. Control Comp. Sci. 52, 1080–1083 (2018). https://doi.org/10.3103/S0146411618080059
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411618080059