2019, Vol.22, No.3, pp.277 - 284
The article presents a comparative analysis of information security threats and currently used methods of protection in networks with a dynamic architecture. Approaches based on centralized and decentralized public key infrastructures, as well as a reputational approach to authentication of network nodes, are considered, their drawbacks are noted. The basic principles of the trust concept between nodes in self-organizing networks with a dynamic architecture are given. A grapho-analytical model of key distribution based on a blockchainlike data registry is proposed.
Key words: networks with dynamic architecture, blockchain, decentralized infrastructure, transactions, floating genesis block
Full text: Acrobat PDF (1060 KB)
Copyright © Nonlinear Phenomena in Complex Systems. Last updated: November 3, 2019