当前位置:网站首页>Research on a Consensus Mechanism-Based Anti-Runaway Scheme for Digital Trunking Terminals
Research on a Consensus Mechanism-Based Anti-Runaway Scheme for Digital Trunking Terminals
2022-08-11 04:42:00 【Robert's Tech House】
Summary:
How to effectively prevent the digital trunking terminal from running out of control through technical means is one of the security and confidentiality technologies that needs to be solved urgently in the large-scale application of the digital trunking communication system.As an important mode widely used in the trunking communication system, the pass-through mode has the characteristics of non-central distributed networking, so the traditional solution cannot effectively realize the real-time anti-runaway of the digital trunking terminal in the pass-through mode.Through the analysis, the core problems of "who will judge" and "how to judge" in the terminal runaway prevention in the pass-through mode are put forward.Practical Byzantine Fault Tolerance Algorithm in Block Chain to design a digital cluster terminal anti-runaway scheme that can be used in pass-through mode.
Content Directory:
1 Existing work and deficiencies
1.1 Current status of cluster terminal anti-runaway technology
1.1.1 Proactive prevention
1.1.2 Passive Response
1.2 The deficiencies of the existing cluster terminal anti-runaway technology
2 Schematic design
2.1 Solutions for real-time out-of-control of cluster terminals in DMO mode
2.2 Design of Judgment Rules
2.2.1 Definition of "out of control"
2.2.2 Judgment Rules
2.3 Choice of Consensus Mechanism
2.4 PBFT algorithm and adaptive improvement
3 Specific plans
3.1 The main process of the program
3.2 Local processing flow of cluster terminal
3.3 Specific implementation examples
3.4 Summary
In recent years, digital trunking communication systems have been widely used in special users such as the party, government, and military, as well as major industry users such as transportation, energy, airports, and ports.Due to the particularity of its application scenarios and the nature of users, the security of the system is particularly important.As an important branch of the security concept of the digital trunking communication system, the problem of preventing the loss of control of the trunking terminal is closely related to the security of the system operation.At present, the cluster terminals used by the party, government, military and other special user equipment are mostly security password equipment, and the level of equipment management and control is relatively high.
边栏推荐
- rub the heat - do not open
- 如何将360全景图导出高清短视频分享到视频平台上?
- MySQL database storage engine and database creation, modification and deletion
- Dry goods: The principle and practice of server network card group technology
- ALSA音频架构 -- snd_pcm_open函数分析
- Mysql: set the primary key to automatically increase the starting value
- 校园兼职平台项目反思
- 【服务器安装Redis】Centos7离线安装redis
- 【FPGA】abbreviation
- CAN/以太网转换器 CAN与以太网互联互通
猜你喜欢
【yolov7系列三】实战从0构建训练自己的数据集
The principle, architecture, implementation, practice of "transfer" and "search", no need to be afraid of interviews
LeetCode814 Math Question Day 15 Binary Tree Series Value "814 Binary Tree Pruning"
"104 Maximum Depth of Binary Trees" in LeetCode's Day 12 Binary Tree Series
(转)JVM中那些区域会发生OOM?
如何给网页添加icon图标?
网络安全培训机构哪家好?排名怎么选择?
Get Qt installation information: including installation directory and various macro addresses
梅克尔工作室--OpenEuler培训笔记(1)
干货:服务器网卡组技术原理与实践
随机推荐
洛谷P6586 蒟蒻火锅的盛宴
【服务器安装Redis】Centos7离线安装redis
Clang Code Model: Error: The clangbackend executable “X:/clangbackend.exe“ could not be started
Where can machine learning be applied?What is machine learning useful for?
Listen to pull out U disk inserted into the message, U disk drive
What is machine learning?Explain machine learning concepts in detail
我的LaTeX入门
How to add icons to web pages?
jwsManager服务接口实现类-jni实现
洛谷P4061 大吉大利,晚上吃鸡
增加PRODUCT_BOOT_JARS及类 提供jar包给应用
蹭个热度-请勿打开
Common layout effect realization scheme
校园兼职平台项目反思
[Actual combat scene] Mall-discount event design plan
The principle, architecture, implementation, practice of "transfer" and "search", no need to be afraid of interviews
洛谷P5139 z小f的函数
网络安全培训机构哪家好?排名怎么选择?
"98 BST and Its Verification" of the 13th day of leetcode brushing series of binary tree series
监听U盘插入 拔出 消息,获得U盘盘符