Research Article

GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks

Table 1

Summary of the voting algorithms.

Voting algorithmsAdvantageCommon defect

Majority votingDirect voting, shielding single points of failureIgnore the loss of performance and affect system availability
K out of N votingAt least K of N results are correct
Large number of votingShield faulty replicas from malicious spread
Probability-based votingImprove the probability of consistent correct voting
Unanimous votingHistory information applied to consensus vote