The Internet of Things (IoT) is supposed to bridge diversiform service functions and heterogeneous network components. Although the Web3 and blockchain have been regarded as pioneers to retrieve the power and rights from current and future Internet giants, there are still many serious integration issues if information centric mechanisms are enabled. In this article, we establish a system for Reliable Decentralized Networks (RDN) to enhance the capability of content privacy protection based on smart collaborative theory. Possible solutions are explored to create compatible IoT environment when massive data packets have been exposed and shared in complex scenarios. Specifically, we first present common cyberattack approaches inspired by well-known service patterns and typical network characteristics. The information centric requirements are investigated to reduce the leakage risk of existing procedures, which provides necessary repertoire for implementations. The details of RDN design and deployment include target content classifications, representative combination analysis, caching pattern identifications, etc. Finally, we validate the RDN prototype to illustrate endogenous advantages and potential utilities.
Exploring Reliable Decentralized Networks with Smart Collaborative Theory
Pau, Giovanni;
2023-01-01
Abstract
The Internet of Things (IoT) is supposed to bridge diversiform service functions and heterogeneous network components. Although the Web3 and blockchain have been regarded as pioneers to retrieve the power and rights from current and future Internet giants, there are still many serious integration issues if information centric mechanisms are enabled. In this article, we establish a system for Reliable Decentralized Networks (RDN) to enhance the capability of content privacy protection based on smart collaborative theory. Possible solutions are explored to create compatible IoT environment when massive data packets have been exposed and shared in complex scenarios. Specifically, we first present common cyberattack approaches inspired by well-known service patterns and typical network characteristics. The information centric requirements are investigated to reduce the leakage risk of existing procedures, which provides necessary repertoire for implementations. The details of RDN design and deployment include target content classifications, representative combination analysis, caching pattern identifications, etc. Finally, we validate the RDN prototype to illustrate endogenous advantages and potential utilities.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.