Intrusion-Tolerant Reliable Broadcast

نویسندگان

  • Silvia Bonomi
  • Antonella Del Pozzo
  • Roberto Baldoni
چکیده

We consider a system with n processes where some of them can show a byzantine behavior. A byzantine process can deviate arbitrarily from the protocol, e.g., dropping messages, changing the content of a message (different recipients may receive different content of the same broadcast message), delivering messages not sent by any process or creating fake messages. This paper introduces a new broadcast abstraction, namely Intrusion-tolerant Reliable Broadcast (IT-RB). IT-RB ensures that if a message M(v) (where v is the content of M) is broadcast by a correct process, all correct processes will deliver v. Consider now {v1, . . . , vk} (with 1 ≤ k < n) be the set of contents associated with M and sent to other processes by a byzantine one, IT-RB ensures: if the sender of the broadcast M is byzantine, then a subset of correct processes deliver the same content v ∈ {v1, . . . , vk} while the rest of correct processes deliver ⊥. We first provide a protocol P implementing IT-RB and prove its correctness. P can deliver an infinite number of ⊥ in an infinite run. Secondly, we introduce an oracle detecting byzantine processes running P , namely P-LO, and provide an implementation of P-LO. Such oracle exploits the information collected by a process running P to infer bad process behaviors and to remove them from the computation. Considering an infinite run generated by P∗, i.e. a protocol that runs together P plus P-LO, we finally show that the number of ⊥ delivered by correct processes is finite.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Intrusion-tolerant Replication on the Internet

This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number of group communication primitives, such as binary and multi-valued Byzantine agreement, reliable and consistent broadcast, and an atomic broadcast channel. Atomic broadcast immediately provides secure statemachine rep...

متن کامل

ITFBS: adaptive intrusion-tolerant scheme for body sensor networks in smart space applications

As an important part of the smart space, body sensor networks (BSNs) provide continuous health monitoring and automation assistance for smart environment residents. A high degree of security and reliability for BSN is extremely required. An adaptive and flexible intrusion-tolerant scheme for BSN, namely ITFBS, is proposed. ITFBS dynamically detects intrusions according to the collected intrusio...

متن کامل

A Middleware for Constructing Highly Available, Fault Tolerant, and Attack Tolerant Services

This paper describes the design of a middleware that provides support for constructing highly available, secure, fault-tolerant, and attack-tolerant services. The central component of this middleware is a group communication service that comprises of six network protocols: atomic broadcast, group membership, failure detection, attack detection, group access control, and secure intermember commu...

متن کامل

Securing Broadcast Authentication in Wireless Sensor Networks Against DoS Attack

Timed Efficient Stream Loss-tolerant Authentication (TESLA) and digital signature are security implementations of broadcast authentication in Wireless Sensor Networks (WSNs). Both approaches, however, are considered vulnerable to DoS attacks. Encountering this attack requires a scheme that addresses two security measures: prevention and detection.. This paper provides a hybrid solution between ...

متن کامل

Experiences with building an intrusion-tolerant group communication system

There are many group communication systems (GCSs) that provide consistent group membership and reliable, ordered multicast properties in the presence of crash faults. However, relatively few GCS implementations are able to provide those properties in the presence of malicious faults resulting from intrusions. We describe the systematic transformation of a crash-tolerant GCS, namely C-Ensemble, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013