Byzantine generals problem in the light of P2P computing

被引:0
|
作者
Fedotova, Natalya [1 ]
Veltri, Luca [1 ]
机构
[1] Univ Parma, Dept Informat Engn, I-43100 Parma, Italy
来源
2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS | 2006年
关键词
component: P2P; DHT networks; security; attacks Byzantine agreement; traitors; malicious node;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security problems in P2P environment become more complicated with the growing number of P2P networks and applications. Hence, it is very important to find reliable mechanisms of detection and elimination of various threats, attack sources, and malicious nodes. In this paper we consider how it is possible to apply some classical solutions for Byzantine Generals Problem (BGP), originally described by Lamport and Shostak, in a P2P environment to solve such problems.
引用
收藏
页码:323 / +
页数:2
相关论文
共 50 条
  • [21] A P2P global trust model based on recommendation
    Zhang, Z
    Wang, XM
    Wang, YX
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3975 - 3980
  • [22] Evaluating P2P Networks against Eclipse Attacks
    de Asis Lopez-Fuentes, Francisco
    Eugui-De-Alba, Inaki
    Ortiz-Ruiz, Otoniel M.
    2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 61 - 68
  • [23] A Sybilproof Distributed Identity Management for P2P Networks
    Lesueur, Francois
    Me, Ludovic
    Tong, Valerie Viet Triem
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 684 - 691
  • [24] Distributed Approach for the Security of P2P Wireless Network
    Yin, Chunyong
    Stacey, Nimenya
    Beita, Tatiana Moreira
    Wang, Jin
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 915 - 919
  • [25] Analysis on Security Issues for Mobile P2P Networks
    Tang Hong-Bo
    Yang Zhi-Xing
    Chen Long
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [26] A distributed certification system for structured P2P networks
    Leseuer, Francois
    Me, Ludovic
    Tong, Valerie Viet Triem
    RESILIENT NETWORKS AND SERVICES, 2008, 5127 : 40 - 52
  • [27] A Fuzzy Trust Management Based on Outlier Identification for P2P
    Luo, Zhen
    Li, Zhishu
    Cai, Biao
    ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 678 - +
  • [28] Privacy-Preserving P2P Data Sharing with OneSwarm
    Isdal, Tomas
    Piatek, Michael
    Krishnamurthy, Arvind
    Anderson, Thomas
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) : 111 - 122
  • [29] Recommendation Based P2P File Sharing on Disconnected MANET
    Bhargavi, V. Sesha
    Spandana, T.
    PROCEEDINGS OF 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, 2017, 467 : 209 - 221
  • [30] SECTrust: A Secure and Effective Distributed P2P Trust Model
    Hu, Jianli
    Li, Xiaohua
    Zhou, Bin
    Li, Yonghua
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 34 - 38