Skip to main content

An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration

  • Conference paper
Advanced Computing, Networking and Security (ADCONS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7135))

  • 2816 Accesses

Abstract

Consensus algorithms that, essentially, endeavor agreement or commit on a particular transaction, are preeminent building blocks of distributed systems. It poses more severe threats, in case, the distributed network possesses some arbitrary behaving (malicious) nodes. The proposed article adds up a non-faulty agreement decision to the requesting client nodes from the coordinator replicas. The work is divided into two-phases, namely, a fault-free and fair cluster formation which employs authenticated key management scheme and secondly, an authenticated agreement among the cluster heads resulting in secure and correct outcome of a transaction. We assume a two-layer hierarchy with different clusters of replicas in one layer associated with their cluster heads on another layer. Multiple levels of encryption are incorporated by means of two keys: (1) a unique pair-wise key between the processes, and (2) a communication key that provides more authenticity and enables a secure communication among the processes. The necessary correctness proof has also been presented. The protocol is robust and exhibits better efficiency for long-lived systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Coulouris, G., Dollimore, J., Kindberg, T.: Distributed Systems: Concepts and Design, 3rd edn. Addison-Wesley (2001)

    Google Scholar 

  2. Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. Journal of ACM 32(2), 374–382 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  3. Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Transactions on Computing Systems 20, 398–461 (2002)

    Article  Google Scholar 

  4. Zhao, W.: A byzantine fault tolerant distributed commit protocol. In: IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 37–44 (September 2007)

    Google Scholar 

  5. Chan, H., et al.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  6. Cheng, Y., Agrawal, D.P.: Efficient Pairwise Key Establishment and Management in Static Wireless Sensor Networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems, vol. 7, p. 550 (December 2005)

    Google Scholar 

  7. BFTSim (2008), http://bftsim.mpi-sws.org/

  8. Saini, P., Singh, A.K.: A Preemptive View Change for Fault Tolerant Agreement Using Single Message Propagation. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds.) AIM 2011. CCIS, vol. 147, pp. 507–512. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saini, P., Singh, A.K. (2012). An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-29280-4_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-29279-8

  • Online ISBN: 978-3-642-29280-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics