A Simple and Efficient Signature-Based Consensus Protocol in the Asynchronous Distributed System

被引:2
|
作者
Cheng, Chien-Fu [1 ,2 ]
Tsai, Kuo-Tang [2 ]
Liao, Hsien-Chun [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, New Taipei City 251, Taiwan
[2] Tamkang Univ, Grad Inst Networking & Commun, New Taipei City 251, Taiwan
来源
INFORMATION TECHNOLOGY AND CONTROL | 2012年 / 41卷 / 02期
关键词
distributed consensus problem; oral message; signed message; dormant fault; malicious fault and grouping; TIME; CONSISTENCY; ENVIRONMENT;
D O I
10.5755/j01.itc.41.2.931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The consensus problem in distributed systems is mainly solved by message exchange. Most of previous consensus algorithms rely on exchange of oral messages to achieve consensus among processors. As oral messages are susceptible to influences from malicious attackers, this type of consensus protocols usually requires a large number of rounds of message exchange, and the complexity of message exchange is also excessively high. In light of this drawback of oral message-based consensus algorithms, some scholars proposed signed message-based consensus algorithm to reduce the number of rounds of message exchange required. However, some signed message-based consensus algorithms still have certain drawbacks which make them ineffective in some conditions. To address this issue, we propose a new signed message-based consensus algorithm in this paper. We integrate the concept of grouping into the proposed algorithm and find the best number of groups through mathematical analysis to further reduce the rounds of message exchange required. In other words, the proposed algorithm makes use of digital signature and the concept of grouping to solve the consensus problem. This algorithm can not only increase the fault-tolerance of distributed systems but also significantly reduce the rounds of message exchange required to achieve consensus.
引用
收藏
页码:183 / 198
页数:16
相关论文
共 50 条
  • [41] Detecting Distributed Signature-based Intrusion: The Case of Multi-Path Routing Attacks
    Ma, Jiefei
    Le, Franck
    Russo, Alessandra
    Lobo, Jorge
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [42] PERFORMANCE EVALUATION OF SIGNATURE-BASED ACCESS MECHANISMS FOR EFFICIENT INFORMATION-RETRIEVAL
    YOO, JS
    CHANG, JW
    LEE, YJ
    KIM, MH
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 1993, E76D (02) : 179 - 188
  • [43] A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm
    Bronte, Robert
    Shahriar, Hossain
    Haddad, Hisham M.
    SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 32 - 39
  • [44] A new signature-based method for efficient 3-D object recognition
    Ruiz-Correa, S
    Shapiro, LG
    Melia, M
    2001 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2001, : 769 - 776
  • [45] An Efficient and Secure Authentication Approach in VANET using Location and Signature-Based Services
    Muthumeenakshi, R.
    Balasubramanam, S.
    Singh, Charanjeet
    V. Sapkale, Pallavi
    Mukhedkar, Moresh M.
    AD HOC & SENSOR WIRELESS NETWORKS, 2022, 53 (1-2) : 59 - 83
  • [46] A signature-based approach for reliability modeling and maintenance optimization of a coherent system
    Ahmadi, Reza
    Sobhani, Amirhossein
    COMPUTERS & INDUSTRIAL ENGINEERING, 2022, 171
  • [47] Signature-based calibration of analytical system-level performance models
    Jaddoe, Stanley
    Pimentel, Andy D.
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, PROCEEDINGS, 2008, 5114 : 268 - 278
  • [48] An efficient signature-based strategy for supporting inexact filtering in information filtering systems
    Chang, Ye-In
    Huang, Lee-Wen
    Shen, Jun-Hong
    Wang, Yi-Siang
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (04) : 8431 - 8442
  • [49] An efficient and secure quantum blind signature-based electronic cash transaction scheme
    Gupta, Aman
    Chandra, Gunja Venkat
    Das, Nayana
    Paul, Goutam
    IET QUANTUM COMMUNICATION, 2024, 5 (04): : 619 - 631
  • [50] An efficient signature-based scheme for securing network coding against pollution attacks
    Yu, Zhen
    Wei, Yawen
    Ramkumar, Bhuvaneswari
    Guan, Yong
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 2083 - 2091