نتایج جستجو برای: Byzantine attack

تعداد نتایج: 83821  

Journal: :Int. J. Communication Systems 2014
King Sun Chan Mohammad Rafiqul Alam

Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks (MANET). In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depending on whether or not the colluders are participating in the network functions, the wormh...

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

2003
Felix C. Freiling

• " Obvious analogies " [?] – Faults = attacks – Attack detection and response • " When opposites attract " [Lorenzo Alvisi] – Availability vs. confidentiality • Two different communities with different languages • One common thing: the Byzantine failure model – Security people use it to model malicious attackers – Fault-tolerance people know it, apply it, and think about Byzantine-tolerant sys...

2006
Baruch Awerbuch Robert G. Cole Reza Curtmola David Holmer Herbert Rubens

We investigate the performance of of several protocol enhancements to the On-Demand Secure Byzantine Routing (ODSBR) [3] protocol in the presence of various Byzantine Attack models. These enhancements include a) Nodal Weighting (in addition to Link Weighting) in the reputation database, b) a network layer retransmission capability and c) modifications to the packet flow rates. These enhancement...

Journal: :IEEE Transactions on Dependable and Secure Computing 2011

Journal: :CoRR 2017
Arash Rahnama Panos J. Antsaklis

In this paper, we show synchronization for a group of output passive agents that communicate with each other according to an underlying communication graph to achieve a common goal. We propose a distributed event-triggered control framework that will guarantee synchronization and considerably decrease the required communication load on the band-limited network. We define a general Byzantine att...

Journal: :CoRR 2018
Cong Xie Oluwasanmi Koyejo Indranil Gupta

We propose three new robust aggregation rules for distributed synchronous Stochastic Gradient Descent (SGD) under a general Byzantine failure model. The attackers can arbitrarily manipulate the data transferred between the servers and the workers in the parameter server (PS) architecture. We prove the Byzantine resilience properties of these aggregation rules. Empirical analysis shows that the ...

2007
Kai Han Binoy Ravindran Douglas Jensen

In a decentralized network system, an authenticated node is referred to as a Byzantine node, if it is fully controlled by a traitor or an adversary, and can perform destructive behavior to disrupt the system. Typically, Byzantine nodes together or individually attack point-to-point information propagation by denying or faking messages. In this paper, we assume that Byzantine nodes are of some i...

Journal: :CoRR 2006
Oliver Kosut Lang Tong

The problem of cooperative fusion in the presence of Byzantine sensors is considered. An information theoretic formulation is used to characterize the Shannon capacity of sensor fusion. It is shown that when less than half of the sensors are Byzantine, the effect of Byzantine attack can be entirely mitigated, and the fusion capacity is identical to that when all sensors are honest. But when at ...

2009
Fatemeh Borran André Schiper

We consider the consensus problem in a partially synchronous system with Byzantine faults. In a distributed system of n processes, where each process has an initial value, Byzantine consensus is the problem of agreeing on a common value, even though some of the processes may fail in arbitrary, even malicious, ways. It is shown in [11] that — in a synchronous system — 3t + 1 processes are needed...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید