Abstract
Consensus algorithms that, essentially, endeavor agreement or commit on a particular transaction, are preeminent building blocks of distributed systems. It poses more severe threats, in case, the distributed network possesses some arbitrary behaving (malicious) nodes. The proposed article adds up a non-faulty agreement decision to the requesting client nodes from the coordinator replicas. The work is divided into two-phases, namely, a fault-free and fair cluster formation which employs authenticated key management scheme and secondly, an authenticated agreement among the cluster heads resulting in secure and correct outcome of a transaction. We assume a two-layer hierarchy with different clusters of replicas in one layer associated with their cluster heads on another layer. Multiple levels of encryption are incorporated by means of two keys: (1) a unique pair-wise key between the processes, and (2) a communication key that provides more authenticity and enables a secure communication among the processes. The necessary correctness proof has also been presented. The protocol is robust and exhibits better efficiency for long-lived systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Coulouris, G., Dollimore, J., Kindberg, T.: Distributed Systems: Concepts and Design, 3rd edn. Addison-Wesley (2001)
Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. Journal of ACM 32(2), 374–382 (1985)
Castro, M., Liskov, B.: Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Transactions on Computing Systems 20, 398–461 (2002)
Zhao, W.: A byzantine fault tolerant distributed commit protocol. In: IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 37–44 (September 2007)
Chan, H., et al.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (2003)
Cheng, Y., Agrawal, D.P.: Efficient Pairwise Key Establishment and Management in Static Wireless Sensor Networks. In: IEEE International Conference on Mobile Adhoc and Sensor Systems, vol. 7, p. 550 (December 2005)
BFTSim (2008), http://bftsim.mpi-sws.org/
Saini, P., Singh, A.K.: A Preemptive View Change for Fault Tolerant Agreement Using Single Message Propagation. In: Das, V.V., Thomas, G., Lumban Gaol, F. (eds.) AIM 2011. CCIS, vol. 147, pp. 507–512. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saini, P., Singh, A.K. (2012). An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_71
Download citation
DOI: https://doi.org/10.1007/978-3-642-29280-4_71
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29279-8
Online ISBN: 978-3-642-29280-4
eBook Packages: Computer ScienceComputer Science (R0)