2 research outputs found

    Dynamic Resource Optimization for Decentralized Estimation in Energy Harvesting IoT Networks

    Full text link
    We study decentralized estimation of time-varying signals at a fusion center, when energy harvesting sensors transmit sampled data over rate-constrained links. We propose dynamic strategies to select radio parameters, sampling set, and harvested energy at each node, with the aim of estimating a time-varying signal while ensuring: i) accuracy of the recovery procedure, and ii) stability of the batteries around a prescribed operating level. The approach is based on stochastic optimization tools, which enable adaptive optimization without the need of apriori knowledge of the statistics of radio channels and energy arrivals processes. Numerical results validate the proposed approach for decentralized signal estimation under communication and energy constraints typical of Internet of Things (IoT) scenarios.Comment: Submitted to IEEE Internet of Things Journa

    Contra-*: Mechanisms for Countering Spam Attacks on Blockchain's Memory Pools

    Full text link
    Blockchain-based cryptocurrencies, such as Bitcoin, have seen on the rise in their popularity and value, making them a target to several forms of Denial-of-Service (DoS) attacks, and calling for a better understanding of their attack surface from both security and distributed systems standpoints. In this paper, and in the pursuit of understanding the attack surface of blockchains, we explore a new form of attack that can be carried out on the memory pools (mempools) and mainly targets blockchain-based cryptocurrencies. We study this attack on Bitcoin mempool and explore the attack effects on transactions fee paid by benign users. To counter this attack, this paper further proposes Contra-*:, a set of countermeasures utilizing fee, age, and size (thus, Contra-F, Contra-A, and Contra-S) as prioritization mechanisms. Contra-*: optimize the mempool size and help in countering the effects of DoS attacks due to spam transactions. We evaluate Contra-* by simulations and analyze their effectiveness under various attack conditions
    corecore