نتایج جستجو برای: byzantine attack

تعداد نتایج: 83821  

Journal: :CoRR 2010
Swan Dubois Toshimitsu Masuzawa Sébastien Tixeuil

Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine tolerance is an attractive feature of distributed systems that permits to cope with arbitrary malicious behaviors. Combining these two properties proved difficult: it is impossible ...

2008
Yee Jiun Song Robbert van Renesse

Asynchronous Byzantine consensus algorithms are an important primitive for building Byzantine fault-tolerant systems. Algorithms for Byzantine consensus typically require at least two communication steps for decision; in many systems, this imposes a significant performance overhead. In this paper, we show that it is possible to design Byzantine fault-tolerant consensus algorithms that decide in...

2010
Saju P John Philip Samuel

Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. We refer to any arbitrary action by authenticated nodes resulting in disruption of the routing service such as drop packets, modify packets and miss-route packets as Byzantine behavior, and to such an adversary as a Byzantine adversary. Nodes may exhibit Byzantine beh...

Journal: :CoRR 2015
Cheng Wang Carole Delporte-Gallet Hugues Fauconnier Rachid Guerraoui Anne-Marie Kermarrec

The Byzantine agreement problem requires a set of n processes to agree on a value sent by a transmitter, despite a subset of b processes behaving in an arbitrary, i.e. Byzantine, manner and sending corrupted messages to all processes in the system. It is well known that the problem has a solution in a (an eventually) synchronous message passing distributed system iff the number of processes in ...

2005
Ariel Daliot Danny Dolev

Awareness of the need for robustness in distributed systems increases as distributed systems become integral parts of day-to-day systems. Self-stabilizing while tolerating ongoing Byzantine faults are wishful properties of a distributed system. Many distributed tasks (e.g. clock synchronization) possess e cient non-stabilizing solutions tolerating Byzantine faults or conversely non-Byzantine bu...

Journal: :International Journal of Robust and Nonlinear Control 2022

Summary Distributed optimization algorithms have various advantages and wide applications, while the distributed nature also makes them flimsy in face of external attacks. In this paper two Byzantine attack models are designed, which edge model is seldom considered before. A resilient consensus algorithm based on trusted nodes edges proposed to defend against models. The agreement optimality gu...

Journal: : 2022

Russian Federation’s attack of February 24, 2022 on Ukraine was no coincidence but a strategy to regain the status superpower. Referring history its significant part. Indeed, that is shared history, at least in origin, though differently interpreted by both states, independent from 31 years. Based promoted 16th Century vision Russia as Byzantine Empire’ successor, Putin’s Federation claims righ...

Journal: :CoRR 2012
Alexandre Maurer Sébastien Tixeuil

We consider the problem of reliably broadcasting information in a multihop asynchronous network that is subject to Byzantine failures. That is, some nodes of the network can exhibit arbitrary (and potentially malicious) behavior. Existing solutions provide deterministic guarantees for broadcasting between all correct nodes, but require that the communication network is highly-connected (typical...

Journal: :CoRR 2015
Silvia Bonomi Antonella Del Pozzo Maria Gradinariu Potop-Butucaru

This paper proposes the first implementation of an atomic storage tolerant to mobile Byzantine agents. Our implementation is designed for the roundbased synchronous model where the set of Byzantine nodes changes from round to round. In this model we explore the feasibility of multi-writer multi-reader atomic register prone to various mobile Byzantine behaviors. We prove upper and lower bounds f...

2007
Amitanand S. Aiyer Lorenzo Alvisi Allen Clement Harry C. Li

We present Information Theoretically secure Byzantine Paxos (IT ByzPaxos), the first deterministic asynchronous Byzantine consensus protocol that is provably secure despite a computationally unbounded adversary. Previous deterministic asynchronous algorithms for Byzantine consensus rely on unproven number theoretic assumptions (i.e., digital signatures) to maintain agreement. IT ByzPaxos instea...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید