A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques

Information sharing is vital in any communication network environment to enable network operating services take decisions based on the information collected by several deployed computing devices. The various networks that compose cyberspace, as Internet-of-Things (IoT) ecosystems, have significantly...

Full description

Saved in:
Bibliographic Details
Published inACM computing surveys Vol. 56; no. 12; pp. 1 - 36
Main Authors Batista, Agnaldo de Souza, Dos Santos, Aldri Luiz
Format Journal Article
LanguageEnglish
Published New York, NY ACM 01.12.2024
Association for Computing Machinery
Subjects
Online AccessGet full text
ISSN0360-0300
1557-7341
DOI10.1145/3659944

Cover

More Information
Summary:Information sharing is vital in any communication network environment to enable network operating services take decisions based on the information collected by several deployed computing devices. The various networks that compose cyberspace, as Internet-of-Things (IoT) ecosystems, have significantly increased the need to constantly share information, which is often subject to disturbances. In this sense, the damage of anomalous operations boosted researches aimed at improving resilience to information sharing. Hence, in this survey, we present a systematization of knowledge about scientific efforts for achieving resilience to information sharing on networks. First, we introduce a taxonomy to organize the strategies applied to attain resilience to information sharing on networks, offering brief concepts about network anomalies and connectivity services. Then, we detail the taxonomy in the face of malicious threats, network disruptions, and performance issues, discussing the presented solutions. Next, we analyze the techniques existing in the literature to foster resilience to information exchanged on communication networks to verify their benefits and constraints. Throughout the text, we highlight and argue issues that restrain the use of these techniques during the design and runtime.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0360-0300
1557-7341
DOI:10.1145/3659944