Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures

نویسندگان

  • Chi Ho
  • Robbert van Renesse
  • Mark Bickford
  • Danny Dolev
چکیده

The paper presents and evaluates Nysiad,1 a system that implements a new technique for transforming a scalable distributed system or network protocol tolerant only of crash failures into one that tolerates arbitrary failures, including such failures as freeloading and malicious attacks. The technique assigns to each host a certain number of guard hosts, optionally chosen from the available collection of hosts, and assumes that no more than a configurable number of guards of a host are faulty. Nysiad then enforces that a host either follows the system’s protocol and handles all its inputs fairly, or ceases to produce output messages altogether—a behavior that the system tolerates. We have applied Nysiad to a link-based routing protocol and an overlay multicast protocol, and present measurements of running the resulting protocols on a simulated network.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Byzantine Fault Containment in TTP/C

The TTP/C protocol is a communication protocol for safety-critical real-time applications. It is designed to meet both the cost constraints of the automotive industry and the stringent safety constraints of the aeronautics industry. This is achieved by using the static nature of the TTP/C communication pattern to build relatively cheap communication controllers being supervised by guardians tha...

متن کامل

Distributed Protocols and Heterogeneous Trust: Technical Report

The robustness of distributed systems is usually phrased in terms of the number of failures of certain types that they can withstand. However, these failure models are too crude to describe the different kinds of trust and expectations of participants in the modern world of complex, integrated systems extending across different owners, networks, and administrative domains. Modern systems often ...

متن کامل

Byzantine Fault Tolerance on General Hybrid Adversary Structures

Adversary structures are a generalization of the classical “at most t-out-of-n” threshold failure model which is used in many published Byzantinetolerant protocols. An adversary structure basically lists all coalitions of parties whose corruption the protocol should tolerate. Using adversary structures it is possible to encode dependent failure models, such as “either all Linux machines fail or...

متن کامل

Small Byzantine Quorum Systems

In this paper we present two protocols for asynchronous Byzantine Quorum Systems (BQS) built on top of reliable channels—one for self-verifying data and the other for any data. Our protocols tolerate f Byzantine failures with f fewer servers than existing solutions by eliminating nonessential work in the write protocol and by using read and write quorums of different sizes. In practice, however...

متن کامل

A Byzantine-Fault Tolerant Self-stabilizing Protocol for Distributed Clock Synchronization Systems

Embedded distributed systems have become an integral part of safetycritical computing applications, necessitating system designs that incorporate fault tolerant clock synchronization in order to achieve ultra-reliable assurance levels. Many efficient clock synchronization protocols do not, however, address Byzantine failures, and most protocols that do tolerate Byzantine failures do not self-st...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008