Filters








944 Hits in 2.8 sec

STROBE: Stake-based Threshold Random Beacons [article]

Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris-Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, Alberto Sonnino
2021 IACR Cryptology ePrint Archive  
decentralized protocol requiring trusted randomness.  ...  We revisit decentralized random beacons with a focus on practical distributed applications.  ...  Decentralized random beacons. Beaver and So presented the first decentralized beacon (DRB) in [7] , achieved by way of a threshold homomorphic secret sharing of future bits.  ... 
dblp:journals/iacr/BeaverCKKLNNRS21 fatcat:bmyohsioibbo3ih5maccvdltcy

Post-Quantum VRF and its Applications in Future-Proof Blockchain System [article]

Zengpeng Li, Teik Guan Tan, Pawel Szalachowski, Vishal Sharma, Jianying Zhou
2021 arXiv   pre-print
We also demonstrate potential applications of a quantum-secure VRF, such as quantum-secure decentralized random beacon and lottery-based proof of stake consensus blockchain protocol.  ...  Recently, VRFs have found essential applications in blockchain design, such as random beacons and proof-of-stake consensus protocols.  ...  Decentralized Random Beacon Generation In this section, we resort to the distributed VRF from symmetric primitives to generate the quantum-safe decentralized random beacon (DRB).  ... 
arXiv:2109.02012v1 fatcat:ssyxk5wglzcx3j5xpckoarrgmi

Supporting Beacon and Event-Driven Messages in Vehicular Platoons through Token-Based Strategies

Ali Balador, Elisabeth Uhlemann, Carlos Calafate, Juan-Carlos Cano
2018 Sensors  
Analysis and simulation results in single and multi-hop scenarios showed that, by providing non-competitive channel access and frequent retransmission opportunities, our protocol can offer beacon delivery  ...  The protocol circulates the token within the platoon not in a round-robin fashion, but based on beacon data age, i.e., the time that has passed since the previous collection of status information, thereby  ...  Calafate and Juan-Carlos Cano conceived and designed the protocol. Ali Balador performed the simulation and wrote the paper. Ali Balador and Carlos T.  ... 
doi:10.3390/s18040955 pmid:29570676 pmcid:PMC5948529 fatcat:ki6q4uzd3rh47btp6ev5rinvre

A Reliable Token-Based MAC Protocol for Delay Sensitive Platooning Applications

Ali Balador, Annette Bohm, Elisabeth Uhlemann, Carlos T. Calafate, Juan-Carlos Cano
2015 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall)  
A reliable token-based MAC protocol for delay sensitive platooning applications. 82nd IEEE Vehicular Technology Conference: VTC2015-Fall. IEEE.  ...  A new member joins by broadcasting its beacon during t J , competing for channel access according to the IEEE 802.11p-compliant CSMA random access protocol.  ...  Most VANET applications use IEEE 802.11p, which is a protocol suite directly based on the random medium access control (MAC) method known as the Carrier Sense Multiple Access (CSMA) algorithm.  ... 
doi:10.1109/vtcfall.2015.7390813 dblp:conf/vtc/BaladorBUCC15 fatcat:al6cl6t2ubfzpedsburlhixnji

Decentralized Detection in IEEE 802.15.4 Wireless Sensor Networks

Marco Martalò, Chiara Buratti, Gianluigi Ferrari, Roberto Verdone
2010 EURASIP Journal on Wireless Communications and Networking  
Decentralized detection and MAC issues are jointly investigated through analytical modelling.  ...  We present a mathematical model to study decentralized detection in clustered wireless sensor networks (WSNs).  ...  of the MAC protocol on a decentralized detection strategy.  ... 
doi:10.1155/2010/174063 fatcat:pyg5i6ibtjbuviauehufpnb6za

Ant routing algorithm for the Lightning Network [article]

C. Grunspan, R. Pérez-Marco
2018 arXiv   pre-print
We propose a decentralized routing algorithm that can be implemented in Bitcoin Lightning Network. All nodes in the network contribute equally to path searching.  ...  As drawback we can cite the intensive computational communication and processing which is typical from a totally decentralized protocol.  ...  For example h can be the commonly used SHA256 in Bitcoin protocol.  ... 
arXiv:1807.00151v2 fatcat:7wyntzkpozembbxp6znhsx7xhe

DTB-MAC: Dynamic Token-Based MAC Protocol for reliable and efficient beacon broadcasting in VANETs

Ali Balador, Carlos T. Calafate, Juan-Carlos Cano, Pietro Manzoni
2015 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)  
Based on simulation experiments, we show that the DTB-MAC protocol can achieve better performance compared with IEEE802.11p in terms of channel utilization and beacon delivery ratio.  ...  Our proposed protocol tries to select the best neighbouring node as the next transmitter, and when it is not possible, or when it causes a high overhead, the random access MAC protocol is used instead.  ...  In this paper, we have proposed the DTB-MAC protocol, which uses a combination of a token passing mechanism and a random access MAC protocol to benefit from their advantages, being able to broadcast beacons  ... 
doi:10.1109/ccnc.2015.7157955 dblp:conf/ccnc/BaladorCCM15 fatcat:fhevzzjkandmvahalkokuncid4

Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking

Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansley Post, Amit Kumar Saha, Peter Druschel, David B. Johnson, Rudolf Riedi
2008 Ad hoc networks  
in the network hierarchy, which supports decentralized network services on top of Safari.  ...  The Safari architecture provides scalable ad hoc network routing, the seamless integration of infrastructure networks when and where they are available, and the support of self-organizing, decentralized  ...  "leaves" the drum competition.  ... 
doi:10.1016/j.adhoc.2007.04.007 fatcat:cs3u6u6sjvh25efz3jqwwdugri

Design and Analysis of A Beacon-Less Routing Protocol for Large Volume Content Dissemination in Vehicular Ad Hoc Networks

Miao Hu, Zhangdui Zhong, Minming Ni, Andrea Baiocchi
2016 Sensors  
In this paper, a link Lifetime-aware Beacon-less Routing Protocol (LBRP) is designed for large volume content delivery in VANETs.  ...  For the highly dynamical vehicular network topology, beacon-less routing protocols have been proven to be efficient in achieving a balance between the system performance and the control overhead.  ...  Decentralized Routing Protocols Decentralized algorithms can use the exchange of beacons to make efficient decisions for content delivery.  ... 
doi:10.3390/s16111834 pmid:27809285 pmcid:PMC5134493 fatcat:xo6w4ia76bd27dylhp35ydlkhm

Multiple Access Control for Cognitive Radio-Based IEEE 802.11ah Networks

Muhammad Shafiq, Maqbool Ahmad, Azeem Irshad, Moneeb Gohar, Muhammad Usman, Muhammad Khalil Afzal, Jin-Ghoo Choi, Heejung Yu
2018 Sensors  
Furthermore, we propose a decentralized channel access procedure that avoids the HPT problem and resolves interference with the incumbent receiver.  ...  The results are quite promising, which makes the RACIR protocol a strong candidate for the CR-based IoT environment.  ...  Proposed MAC Protocol The proposed MAC protocol, called carrier sense Restricted Access with Collision and Interference Resolution (RACIR), is based on the random access model.  ... 
doi:10.3390/s18072043 pmid:29949927 pmcid:PMC6068667 fatcat:3un7jkehqrfirmi6u62litfgoe

A localized de-synchronization algorithm for periodic data reporting in IEEE 802.15.4 WSNs

Domenico De Guglielmo, Giuseppe Anastasi, Marco Conti
2012 2012 IEEE Symposium on Computers and Communications (ISCC)  
As emphasized in previous studies, the IEEE 802.15.4 MAC protocol has severe limitations in terms of performance and energy efficiency, which make it unsuitable for many application scenarios.  ...  In this paper we propose an asynchronous adaptive algorithm for periodic data reporting that leverages the 802.15.4 Beacon-Disabled Mode but desynchronizes the access times of different sensor nodes, so  ...  This access method maximizes competition.• 802. 15 .4 Beacon Disabled (BD) Mode. Sensor nodes are assumed to generate and transmit data at random times within the period T.  ... 
doi:10.1109/iscc.2012.6249363 dblp:conf/iscc/GuglielmoAC12 fatcat:qzmeqzs3zfa25k42fozmsdfqfq

A survey on efficient parallelization of blockchain-based smart contracts [article]

Alessio Meneghetti, Tommaso Parise, Massimiliano Sala, Daniele Taufer
2019 arXiv   pre-print
They will appear in a registry, stored and managed by the beacon chain, and take part to the consensus protocol.  ...  Then inside shards, by using the epoch randomness, at every iteration the committee elects a leader.  ... 
arXiv:1904.00731v1 fatcat:svtr4w5yyncjvhy2jxopsuqkta

A Survey on Efficient Parallelization of Blockchain-based Smart Contracts

Alessio Meneghetti, Tommaso Parise, Massimiliano Sala, Daniele Taufer
2019 Annals of Emerging Technologies in Computing  
They will appear in a registry, stored and managed by the beacon chain, and take part in the consensus protocol.  ...  One of the drawbacks of such a decentralized and public management of data is the huge amount of computational power required to reach consensus.  ... 
doi:10.33166/aetic.2019.05.002 fatcat:wjuqvapsrjbyhfju5wkeaj5xy4

Mt. Random: Multi-Tiered Randomness Beacons [article]

Ignacio Cascudo, Bernardo David, Omer Shlomovits, Denis Varlakov
2021 IACR Cryptology ePrint Archive  
Protocols implementing randomness beacons have been constructed via a number of different techniques.  ...  Many decentralized applications require a common source of randomness that cannot be biased by any single party.  ...  Random: A multi-tiered randomness beacon: More precisely, Mt. Random is a protocol where VRF, TVRF and PVSS based random beacons are run as independent tiers executed in parallel.  ... 
dblp:journals/iacr/CascudoDSV21 fatcat:a5wdlr54nraqfmza3ii67liwwe

Performance comparison of a platooning application using the IEEE 802.11p MAC on the control channel and a centralized MAC on a service channel

Annette Bohm, Magnus Jonsson, Elisabeth Uhlemann
2013 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)  
IEEE 802.11p employs a random medium access protocol, which may experience excessive delays during high network loads.  ...  The European profile of IEEE 802.11p, recently adopted by ETSI, defines two message types to this end, periodic beacons for basic cooperative awareness (CAM) and event-triggered decentralized environmental  ...  Channel access during the CBP is decentralized and based on the CSMA/CA MAC protocol defined by the IEEE 802.11p standard.  ... 
doi:10.1109/wimob.2013.6673411 dblp:conf/wimob/BohmJU13 fatcat:uzlnscik7ffyjh3xkhi5taa3o4
« Previous Showing results 1 — 15 out of 944 results