نتایج جستجو برای: byzantine attack

تعداد نتایج: 83821  

Journal: :IEEE Communications Surveys & Tutorials 2015

2013
D. Geetha B. Revathi Nita Rotaru Elizabeth M. Royer Sanjay Ramaswamy Huirong Fu

A Mobile Ad-hoc Network (MANET) is a dynamic wireless network that can be formulated without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing protocol that adapt to the frequent and randomly changing network topology. Several attacks are possible in the available routing protocols such as Wor...

Journal: :CoRR 2016
Ruohan Cao

This paper focuses on Byzantine attack detection for Gaussian two-way relay network. In this network, two source nodes communicate with each other with the help of an amplify-and-forward relay which may perform Byzantine attacks by forwarding altered symbols to the sources. For simple investigating the detectability of attacks conducted in Gaussian channels, we focus on the MA channel of the ne...

Journal: :CoRR 2018
El Mahdi El Mhamdi Rachid Guerraoui Sébastien Rouault

While machine learning is going through an era of celebrated success, concerns have been raised about the vulnerability of its backbone: stochastic gradient descent (SGD). Recent approaches have been proposed to ensure the robustness of distributed SGD against adversarial (Byzantine) workers sending poisoned gradients during the training phase. Some of these approaches have been proven Byzantin...

2013
Mojtaba GhanaatPisheh Sanaei Imran Ghani Aida Hakemi Seung Ryul Jeong

Faculty of Computing, Universiti Teknologi Malaysia (UTM), Johor Bahru 81300, Malaysia School of Business Information Technology, Kookmin University, Korea [e-mail: [email protected], [email protected], [email protected], [email protected]] ABSTRACT: Today, usage of mobile ad hoc networks (MANET) has become favorable research subject of study due to their flexibility, mobility and se...

2006
Ioannis C. Avramopoulos Jennifer Rexford

IP routing is notoriously vulnerable to accidental misconfiguration and malicious attack. Although secure routing protocols are an important defense, the data plane must be part of any complete solution. Existing proposals for secure (link-level) forwarding are heavy-weight, requiring cryptographic operations at each hop in a path. Instead, we propose a light-weight data-plane mechanism (called...

2013
B. Anjani Kumar K. Hari C. Subash Chandra

Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computati...

2009
Robert Burgess

Ally is a framework for building distributed services in a federated architecture. In a federation, nodes may occupy multiple, independent administrative domains, with complex trust relationships, connected by an asynchronous, wide-area network. We present a library that implements Byzantine fault-tolerant agreement, a critical building-block service in robust distributed systems, targeted at t...

2013
K Sreenivasulu

Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc Networks (MANETs) in military, government and commercial applications. Secure ad hoc networks are expected to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. Routing Algorithm that integrates security and performance requirements ar...

2003
K. Driscoll B. Hall Håkan Sivencrona P. Zumsteg

Since its introduction nearly 20 years ago, the Byzantine Generals Problem has been the subject of many papers having the scrutiny of the fault tolerance community. Numerous Byzantine tolerant algorithms and architectures have been proposed. However, this problem is not yet sufficiently understood by those who design, build, and maintain systems with high dependability requirements. Today, ther...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید