Byzantine Geoconsensus

被引:2
作者
Oglio, Joseph [1 ]
Hood, Kendric [1 ]
Sharma, Gokarna [1 ]
Nesterenko, Mikhail [1 ]
机构
[1] Kent State Univ, Dept Comp Sci, Kent, OH 44242 USA
来源
NETWORKED SYSTEMS, NETYS 2021 | 2021年 / 12754卷
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-91014-3_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We define and investigate consensus for a set of N processes embedded in the d-dimensional plane, d >= 2, which we call the Geoconsensus Problem. The processes have unique coordinates and can communicate with each other through oral messages. Faulty processes are covered by a finite-size convex fault area F. The correct processes know the fault area size but not its location. We prove that the geoconsensus is impossible if all processes may be covered by at most three areas the size of the fault area. On the constructive side, for M >= 1 fault areas F of arbitrary shape with diameter D, we present a consensus algorithm BASIC that tolerates f <= N - (2M + 1) Byzantine processes provided that there are 9M + 3 processes with pairwise distance between them greater than D. We present another consensus algorithm GENERIC that lifts this distance requirement. For square F with side l, GENERIC tolerates f <= N - 15M Byzantine processes given that all processes are covered by at least 22M axis aligned squares of the same size as F. For a circular F of diameter l, GENERIC tolerates f <= N - 57M Byzantine processes if all processes are covered by at least 85M circles. We then estimate the tolerance of GENERIC for various size combinations of fault and non-fault areas as well as d-dimensional process embeddings, where d >= 3.
引用
收藏
页码:19 / 35
页数:17
相关论文
共 29 条
[1]  
Abd-El-Malek Michael, 2005, ACM SIGOPS Operating Systems Review, V39, P59, DOI DOI 10.1145/1095810.1095817
[2]  
Adya A, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P1
[3]  
[Anonymous], 2012, P 2012 ACM S PRINC D
[4]  
Ben-Or M., 1994, Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, P183, DOI 10.1145/197917.198088
[5]  
Bulusu N., 2004, ACM T EMBED COMPUT S, V3, P24, DOI [10.1145/972627.972630, DOI 10.1145/972627.972630]
[6]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[7]   BASE: Using abstraction to improve fault tolerance [J].
Castro, M ;
Rodrigues, R ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2003, 21 (03) :236-269
[8]   UNIT DISK GRAPHS [J].
CLARK, BN ;
COLBOURN, CJ ;
JOHNSON, DS .
DISCRETE MATHEMATICS, 1990, 86 (1-3) :165-177
[9]   A secure and optimally efficient multi-authority election scheme [J].
Cramer, R ;
Gennaro, R ;
Schoenmakers, B .
EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 1997, 8 (05) :481-490
[10]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260