Research Article
GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks
Table 1
Summary of the voting algorithms.
| | Voting algorithms | Advantage | Common defect |
| | Majority voting | Direct voting, shielding single points of failure | Ignore the loss of performance and affect system availability | | K out of N voting | At least K of N results are correct | | Large number of voting | Shield faulty replicas from malicious spread | | Probability-based voting | Improve the probability of consistent correct voting | | Unanimous voting | History information applied to consensus vote |
|
|