Byzantine generals problem in the light of P2P computing

被引:0
|
作者
Fedotova, Natalya [1 ]
Veltri, Luca [1 ]
机构
[1] Univ Parma, Dept Informat Engn, I-43100 Parma, Italy
来源
2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS | 2006年
关键词
component: P2P; DHT networks; security; attacks Byzantine agreement; traitors; malicious node;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security problems in P2P environment become more complicated with the growing number of P2P networks and applications. Hence, it is very important to find reliable mechanisms of detection and elimination of various threats, attack sources, and malicious nodes. In this paper we consider how it is possible to apply some classical solutions for Byzantine Generals Problem (BGP), originally described by Lamport and Shostak, in a P2P environment to solve such problems.
引用
收藏
页码:323 / +
页数:2
相关论文
共 50 条
  • [1] Byzantine generals problem in the light of P2P computing
    Fedotova, Natalya
    Veltri, Luca
    2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 312 - +
  • [2] A decision support system for the uses of lightweight blockchain designs for P2P computing
    Meng, Yuyu
    Nazir, Shah
    Guo, Jing
    Uddin, Irfan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (05) : 2708 - 2718
  • [3] UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P
    孙道清
    蒲芳
    曹奇英
    JournalofDonghuaUniversity(EnglishEdition), 2008, 25 (04) : 475 - 483
  • [4] UCSMssp: Ubiquitous Computing Service Model Based on SPKI/SDSI and P2P
    Sun, Daoqing
    Pu, Fang
    Cao, Qiying
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2822 - 2827
  • [5] Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems
    Dubey, Jigyasu
    Tokekar, Vrinda
    2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 219 - 223
  • [6] Analytical evaluation of P2P reputation systems
    Lagesse, Brent
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 9 (1-2) : 82 - 96
  • [7] Malicious Peers Eviction for P2P Overlays
    Ismail, Hatem
    Germanus, Daniel
    Suri, Neeraj
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 216 - 224
  • [8] Hybrid P2P Architecture for Transaction Management
    Marrocco, Steven
    Anane, Rachid
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 192 - 198
  • [9] Simulating trust overlay in P2P networks
    Zhang, Yan
    Wang, Wei
    Lu, Shunying
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 1, PROCEEDINGS, 2007, 4487 : 632 - +
  • [10] Securing Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 37 - 43