Efficient multicasting agreement protocol

被引:6
|
作者
Wang, SC
Yan, KQ
Cheng, CF
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Wufeng 413, Taichung, Taiwan
[2] Chaoyang Univ Technol, Dept Business Adm, Wufeng 413, Taichung, Taiwan
[3] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Wufeng 413, Taichung, Taiwan
[4] Chaoyang Univ Technol, Grad Inst Comp Sci & Informat Engn, Wufeng 413, Taichung, Taiwan
关键词
byzantine agreement; parallel processing; multicasting network; hybrid fault mode; dual failure mode;
D O I
10.1016/S0920-5489(03)00070-9
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The fault-tolerance is an important research topic in the study of distributed systems. To cope with the influence from faulty components, reaching a common agreement at the presence of faults before performing some special tasks is essential. Therefore, the Byzantine agreement (BA) problem has drawn more and more of the researchers' attention as they explore deeper and deeper into the world of distributed systems. Traditionally, the BA problem has been visited in a Fully Connected Network (FCN), BroadCasting Network (BCN) or Generalize Connected Network (GCN), making the malicious fault assumption with processors or communication media grows into the dual failure mode on both processors and communication media. However, the network structures (topologies) of FCN, BCN and GCN are not practical nowadays. In this study, we shall take a close look at the limits of the network structure to revisit the BA problem with a Multi-Casting Network (MCN). FCN, BCN and GCN are all special cases of MCN, so the new protocol we shall propose here will also be able to solve the BA problem with FCN, BCN and GCN structures. Our new protocol uses a minimum number of rounds of message exchange and can tolerate a maximum number of allowable faulty components and make each fault-free processor reach a common agreement in an MCN. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:93 / 111
页数:19
相关论文
共 50 条
  • [1] Reliable and Energy Efficient Protocol for MANET Multicasting
    AlQarni, Bander H.
    AlMogren, Ahmad S.
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2016, 2016
  • [2] A feedback based multicasting protocol for efficient video on demand
    Chung, YJ
    Tewfik, AH
    2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 977 - 980
  • [3] An efficient protocol for authenticated key agreement
    Law, L
    Menezes, A
    Qu, MH
    Solinas, J
    Vanstone, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (02) : 119 - 134
  • [4] An Efficient Protocol for Authenticated Key Agreement
    Laurie Law
    Alfred Menezes
    Minghua Qu
    Jerry Solinas
    Scott Vanstone
    Designs, Codes and Cryptography, 2003, 28 : 119 - 134
  • [5] An efficient group key agreement protocol
    Jung, BE
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (02) : 106 - 107
  • [6] Enhanced Bandwidth Efficient Cluster Based Multicasting Protocol in VANETs
    Singh, Amarpreet
    Kaur, Navneet
    2015 2ND INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN ENGINEERING & COMPUTATIONAL SCIENCES (RAECS), 2015,
  • [7] A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks
    Law, Lap Kong
    Krishnamurthy, Srikanth V.
    Faloutsos, Michalis
    COMPUTER NETWORKS, 2007, 51 (03) : 823 - 834
  • [8] Efficient Key Agreement Protocol for Smart Sensors
    Guan, Albert
    Lei, Chin-Laung
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 74 - 80
  • [9] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [10] An efficient authenticated group key agreement protocol
    He Yong-Zhong
    Han Zhen
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 250 - +