Byzantine generals problem in the light of P2P computing

被引:0
作者
Fedotova, Natalya [1 ]
Veltri, Luca [1 ]
机构
[1] Univ Parma, Dept Informat Engn, I-43100 Parma, Italy
来源
2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS | 2006年
关键词
component: P2P; DHT networks; security; attacks Byzantine agreement; traitors; malicious node;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security problems in P2P environment become more complicated with the growing number of P2P networks and applications. Hence, it is very important to find reliable mechanisms of detection and elimination of various threats, attack sources, and malicious nodes. In this paper we consider how it is possible to apply some classical solutions for Byzantine Generals Problem (BGP), originally described by Lamport and Shostak, in a P2P environment to solve such problems.
引用
收藏
页码:323 / +
页数:2
相关论文
共 50 条
  • [31] Scalable Secure Routing for Heterogeneous Unstructured P2P Networks
    Kraxberger, Stefan
    PROCEEDINGS OF THE 19TH INTERNATIONAL EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2011, : 619 - 626
  • [32] Security and privacy issues in P2P streaming systems: A survey
    Gheorghe, Gabriela
    Lo Cigno, Renato
    Montresor, Alberto
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (02) : 75 - 91
  • [33] DIP: Distributed Identification of Polluters in P2P Live Streaming
    Gaeta, Rossano
    Grangetto, Marco
    Bovio, Lorenzo
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2014, 10 (03)
  • [34] On the feasibility of exploiting P2P systems to launch DDoS attacks
    Sun, Xin
    Torres, Ruben
    Rao, Sanjay G.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2010, 3 (01) : 36 - 51
  • [35] On the feasibility of exploiting P2P systems to launch DDoS attacks
    Xin Sun
    Ruben Torres
    Sanjay G. Rao
    Peer-to-Peer Networking and Applications, 2010, 3 : 36 - 51
  • [36] Analysis of Malicious Peers in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [37] Study of Security Problems in P2P E-commerce
    Lin Ying
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 662 - 665
  • [38] The Research of Security of P2P Network File Sharing System
    Li, Shaojing
    Su, Wanli
    Li, Haoling
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 250 - 254
  • [39] Secure Digital Contents Distributing System on P2P Networks
    Ing-Chau Chang
    Hung-Wen Yang
    Journal of Electronic Science and Technology, 2012, (03) : 263 - 268
  • [40] Security and privacy issues in P2P streaming systems: A survey
    Gabriela Gheorghe
    Renato Lo Cigno
    Alberto Montresor
    Peer-to-Peer Networking and Applications, 2011, 4 : 75 - 91