Byzantine generals problem in the light of P2P computing

被引:0
作者
Fedotova, Natalya [1 ]
Veltri, Luca [1 ]
机构
[1] Univ Parma, Dept Informat Engn, I-43100 Parma, Italy
来源
2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS | 2006年
关键词
component: P2P; DHT networks; security; attacks Byzantine agreement; traitors; malicious node;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security problems in P2P environment become more complicated with the growing number of P2P networks and applications. Hence, it is very important to find reliable mechanisms of detection and elimination of various threats, attack sources, and malicious nodes. In this paper we consider how it is possible to apply some classical solutions for Byzantine Generals Problem (BGP), originally described by Lamport and Shostak, in a P2P environment to solve such problems.
引用
收藏
页码:323 / +
页数:2
相关论文
共 50 条
  • [41] Enhancing Rumor Riding protocol in P2P network with Cryptographic puzzle through challenge question method
    Christo, Mary Subaja
    Meenakshi, S.
    COMPUTERS & ELECTRICAL ENGINEERING, 2018, 65 : 122 - 138
  • [42] SoK: Network-Level Attacks on the Bitcoin P2P Network
    Franzoni, Federico
    Daza, Vanesa
    IEEE ACCESS, 2022, 10 : 94924 - 94962
  • [43] A Secure and Lightweight Micro-Payment Scheme in P2P Networks
    Huang, Qiubo
    Zhao, Yuqing
    2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 134 - 137
  • [44] AuthenticPeer plus plus : A Trust Management System for P2P Networks
    Alkharji, Sarah
    Kurdi, Heba
    Altamimi, Rasha
    Aloboud, Ebtesam
    UKSIM-AMSS 11TH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2017), 2017, : 191 - 196
  • [45] A Feasible DRM Mechanism for BT-like P2P System
    Chen, Yu-Yi
    Jan, Jinn-Ke
    Chi, Yo-Yu
    Tsai, Meng-Lin
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 323 - +
  • [46] File Management in a Mobile DHT-based P2P Environment
    Ashraf, Khalid
    Anane, Rachid
    Bordbar, Behzad
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 415 - 422
  • [47] BitTorrent Worm Sensor Network: P2P Worms Detection and Containment
    Hatahet, Sinan
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    PROCEEDINGS OF THE PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, 2009, : 293 - 300
  • [48] A design of IPTV conditional access mechanism based on P2P network
    Chen, Yu-Yi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (01) : 24 - 30
  • [49] A design of IPTV conditional access mechanism based on P2P network
    Yu-Yi Chen
    Peer-to-Peer Networking and Applications, 2014, 7 : 24 - 30
  • [50] Detection and mitigation of localized attacks in a widely deployed P2P network
    Thibault Cholez
    Isabelle Chrisment
    Olivier Festor
    Guillaume Doyen
    Peer-to-Peer Networking and Applications, 2013, 6 : 155 - 174