byzantine nodes
Recently Published Documents


TOTAL DOCUMENTS

6
(FIVE YEARS 2)

H-INDEX

2
(FIVE YEARS 0)

2021 ◽  
Vol Volume 17, Issue 4 ◽  
Author(s):  
Massimo Bartoletti ◽  
Letterio Galletta ◽  
Maurizio Murgia

Decentralized blockchain platforms have enabled the secure exchange of crypto-assets without the intermediation of trusted authorities. To this purpose, these platforms rely on a peer-to-peer network of byzantine nodes, which collaboratively maintain an append-only ledger of transactions, called blockchain. Transactions represent the actions required by users, e.g. the transfer of some units of crypto-currency to another user, or the execution of a smart contract which distributes crypto-assets according to its internal logic. Part of the nodes of the peer-to-peer network compete to append transactions to the blockchain. To do so, they group the transactions sent by users into blocks, and update their view of the blockchain state by executing these transactions in the chosen order. Once a block of transactions is appended to the blockchain, the other nodes validate it, re-executing the transactions in the same order. The serial execution of transactions does not take advantage of the multi-core architecture of modern processors, so contributing to limit the throughput. In this paper we develop a theory of transaction parallelism for blockchains, which is based on static analysis of transactions and smart contracts. We illustrate how blockchain nodes can use our theory to parallelize the execution of transactions. Initial experiments on Ethereum show that our technique can improve the performance of nodes.


This paper presents a Cohen Kappa Reliability Factor-based Mitigation Mechanism (CKRFMM) for enabling trustworthy detection of Byzantine nodes. This detection process is achieved by estimating the reliability of the mobile nodes calculated through Cohen Kappa Reliability Factor (CKRF). CKRFMM reconfirms the byzantine behavior of active mobile nodes through Pareto function. Pareto function is a predominant re-test reliability estimator available in the classical theory of statistics. The simulation experimentation conducted using ns-2 of the CKRFMM is determined to be excellent in reducing energy consumptions, network delay compared to the benchmarked byzantine node detection schemes considered for investigation.


Information ◽  
2018 ◽  
Vol 9 (9) ◽  
pp. 214
Author(s):  
Tomasz Janus ◽  
Mateusz Skomra ◽  
Marcin Dziubiński

Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. The decentralized nature of such protection is known to be inefficient, but the inefficiencies can be mitigated by a careful network design. Is network design still effective when not all users can be trusted? We propose a model of network design and defense with byzantine nodes to address this question. We study the optimal defended networks in the case of centralized defense and, for the case of decentralized defense, we show that the inefficiencies due to decentralization can be mitigated arbitrarily well when the number of nodes in the network is sufficiently large, despite the presence of the byzantine nodes.


Energies ◽  
2018 ◽  
Vol 11 (7) ◽  
pp. 1844 ◽  
Author(s):  
Yilun Shang

Multiscale consensus has been studied recently as a new concept in the field of multi-agent systems, which is able to accommodate many complicated coordination control tasks where values are measured in different scales due to, e.g., the constraints of physical environment. In this paper, we investigate the problem of resilient multiscale coordination control against a set of adversarial or non-cooperative nodes in directed networks. We design a multiscale filtering algorithm based upon local information which can withstand both faulty and Byzantine nodes. Building on the concept of network robustness, we establish necessary and sufficient conditions guaranteeing multiscale consensus with general time varying scales in the presence of globally bounded as well as locally bounded threats. In particular, for a network containing at most R faulty nodes, multiscale consensus is achieved if and only if the network is (R+1,R+1)-robust. The counterpart when having at most R Byzantine nodes instead is that the induced subnetwork of cooperative nodes is R+1-robust. Conditions guaranteeing resilient consensus for time-dependent networks are developed. Moreover, multiscale formation generation problems are introduced and solved as the generalizations. Finally, some numerical examples including applications in modular microgrids and power systems are worked out to demonstrate the availability of our theoretical results.


Sign in / Sign up

Export Citation Format

Share Document