首页 | 本学科首页   官方微博 | 高级检索  
     


Byzantine Agreement under dual failure mobile network
Affiliation:1. Department of Information Management, Chaoyang University of Technology, 168, Jifong E. Rd., Wufong Township, Taichung County 41349, Taiwan, ROC;2. Department of Business Administration, Chaoyang University of Technology, 168, Jifong E. Rd., Wufong Township, Taichung County 41349, Taiwan, ROC;1. School of Automation Science and Engineering, South China University of Technology, Guangzhou, 510641, China;2. Pazhou Laboratory, Guangzhou, 510330, China;1. Department of Informatics, University of Hamburg, 22527 Hamburg, Germany;2. Department of Mathematical Sciences, Stellenbosch University, 7600 Stellenbosch, South Africa;3. School of Mathematics and Statistics, University of Melbourne, Vic 3010, Australia
Abstract:Networks are trending towards wireless systems that provide support for mobile computing. The Byzantine Agreement (BA) protocols used in static networks do not perform well in a dynamically changing mobile environment. Mobile commerce and related applications are necessary for wireless networks. There are numerous properties in a wireless network that play important roles. For example, the processors in a wireless network have highly mobile capabilities. Processors can immigrate into or move away from the network at any time. Although mobile technology has brought greater convenience, it is comparatively more dangerous. Wireless systems are susceptible to security flaws such as attacks by hackers. The number of allowable faulty components within the system is also decreased. To increase the number of allowable faulty components and ensure network security, a simple, secure and efficient protocol, BAM, is proposed to handle the BA problem. The fault symptoms include malicious and dormant faults. Furthermore, the proposed protocol uses the minimum number of message exchange rounds to make all healthy processors agree on a common value and can tolerate the maximum number of allowable faulty components. The proposed method will also ensure message security and increase the system's fault tolerant capability.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号