skip to main content
10.1145/1073814.1073880acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

Reliable broadcast in unknown fixed-identity networks

Published: 17 July 2005 Publication History

Abstract

In this paper, we formulate a new theoretical problem, namely the reliable broadcast problem in unknown fixed-identity networks. This problem arises in the context of developing decentralized security mechanisms in a specific-class of distributed systems: Consider an undirected graph G connecting n nodes where each node is aware of only its neighbors but not of the entire graph. Additionally, each node has a unique identity and cannot fake its identity to its neighbors. Assume that k among the n nodes act in an adversarial manner and the remaining n-k are good nodes. Under what constraints does there exist a distributed algorithm Γ that enables every good node v to reliably broadcast a message m(v) to all other good nodes in G? While good nodes follow the algorithm Γ, an adversary can additionally discard messages, generate spurious messages or collude with other adversaries.In this paper, we prove two results on this problem. First, we provide a distributed algorithm Γ that can achieve reliable broadcast in an unknown fixed-identity network in the presence of k adversaries if G is 2k+1 vertex connected. Additionally, a minimum vertex connectivity of 2k+1 is a necessary condition for achieving reliable broadcast. Next, we study the problem of reliable broadcast in sparse networks (1-connected and 2-connected) in the presence of a single adversary i.e. k=1. In sparse networks, we show that a single adversary can partition the good nodes into groups such that nodes within a group can reliably broadcast to each other but nodes across groups cannot. For 1-connected and 2-connected graphs, we prove lower bounds on the number of such groups and provide a distributed algorithm to achieve these lower bounds. We also show that in a power-law random graph G(n,α), a single adversary can partition at most O(n1/α x (log n)(5- α)/(3-α)) good nodes from the remaining set of good nodes.Addressing this problem has practical implications to two real-world problems of paramount importance: (a) developing decentralized security measures to protect Internet routing against adversaries; (b) achieving decentralized public key distribution in static networks. Prior works on Byzantine agreement [17, 11, 23, 13, 3, 4, 24] are not applicable for this problem since they assume that either G is known, or that every pair of nodes can directly communicate, or that nodes use a key distribution infrastructure to sign messages. A solution to our problem can be extended to solve the byzantine agreement problem in unknown fixed-identity networks.

References

[1]
Internet Assigned Numbers Authority. http://www.iana.org.]]
[2]
Aiello, W., Chung, F. R. K., and Lu, L. A random graph model for massive graphs. In ACM STOC (2000), pp. 171--180.]]
[3]
Beimel, A., and Franklin, M. Efficient Reliable Communication over Partially Authenticated Networks. In Theoretical Computer Science (1999), vol. 220, pp. 185--210.]]
[4]
Beimel, A., and Malka, L. Efficient Reliable Communication over Partially Authenticated Networks. In PODC (2003).]]
[5]
Ben-Or, M. Another Advantage of Free Choice: Completely Asyncrhonous Agreement Protocols. In PODC (1983).]]
[6]
Boneh, D., and Franklin, M. Identity-based Encryption from the Weil Pairing. In CRYPTO (2001).]]
[7]
Cachin, C., Kursawe, K., and Shoup, V. Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography. In PODC (2000).]]
[8]
Chang, H., R.Govindan, Jamin, S., Shenker, S., and Willinger, W. Towards capturing representative AS-level Internet topologies. In Journal of Computer Networks (2004).]]
[9]
Chung, F., and Lu, L. The Average Distance in Random Graphs with given Expected Degrees. In Internet Mathematics (2003), vol. 1, pp. 91--114.]]
[10]
Cocks, C. An Indentity-based Encryption Scheme based on Quadratic Residues. In IMA (2001).]]
[11]
Dolev, D. The byzantine generals strike again. In Journal of Algorithms (1982), pp. 14--30.]]
[12]
Dolev, D., Dwork, C., Waarts, O., and Yung, M. Perfectly secure message transmission. In Journal of the ACM (1993), pp. 17--47.]]
[13]
Feldman, P., and Micali, S. Optimal algorithms for byzantine agreement. In ACM Symposium on the Theory of Computing (1988), pp. 148--161.]]
[14]
Gamal, T. E. A public-key cryptosystem and a signature scheme based on discrete logarithms. In IEEE Transactions in Information Theory (1985), pp. 469--472.]]
[15]
Giordano, S. Mobile ad hoc networks. 325--346.]]
[16]
Kent, S., Lynn, C., and Seo, K. Secure Border Gateway Protocol (Secure-BGP). IEEE Journal on Selected Areas of Communications 18, 4 (April 2000), 582--592.]]
[17]
Lamport, L., Shostak, R., and M.Pease. The byzantine generals problem. In ACM Trans. Program. Lang. Systems (1982), pp. 382--401.]]
[18]
Levine, M. BGP noise tonight? NANOG mail archives, October 2001. http://www.merit.edu/mail.archives/nanog/2001-10/msg00221.html.]]
[19]
Lynch, N. Distributed Algorithms. Morgan Kaufmann, San Francisco, 1996.]]
[20]
Misel, A. S. Wow, AS7007! NANOG mail archives, April 1997. http://www.merit.edu/mail.archives/nanog/1997-04/msg00340.html.]]
[21]
Mockapetris, P., and Dunlap, K. Development of the domain name system. In SIGCOMM (1988), pp. 123--133.]]
[22]
Oram, A. Peer-to-peer: Harnessing the power of disruptive technologies, 2001.]]
[23]
Pease, M., Shostak, R., and Lamport, L. Reaching agreement in the presence of faults. In Journal of the ACM (1980), pp. 228--234.]]
[24]
Rabin, M. Randomized Byzantine Generals. In FOCS'83 (1983), pp. 403--409.]]
[25]
Secure Origin BGP (soBGP). ftp://ftp-eng.cisco.com/sobgp.]]
[26]
Shamir, A. Identity-based Cryptosystems and Signature Schemes. In CRYPTO (1984).]]
[27]
Subramanian, L., Katz, R. H., Roth, V., Shenker, S., and Stoica, I. Reliable Broadcast in Unknown Fixed-Identity Networks. In UC Berkeley Technical Report No.CSD-04-1358.]]
[28]
Subramanian, L., Roth, V., Stoica, I., Shenker, S., and Katz, R. Listen and Whisper: Security Mechanisms in BGP. In Proceedings of ACM/ USENIX NSDI (2004).]]

Cited By

View all

Index Terms

  1. Reliable broadcast in unknown fixed-identity networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      PODC '05: Proceedings of the twenty-fourth annual ACM symposium on Principles of distributed computing
      July 2005
      364 pages
      ISBN:1581139942
      DOI:10.1145/1073814
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 July 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. byzantine agreement
      2. reliable broadcast
      3. unknown network

      Qualifiers

      • Article

      Conference

      PODC05

      Acceptance Rates

      Overall Acceptance Rate 740 of 2,477 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)4
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 02 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2013)Vampire AttacksIEEE Transactions on Mobile Computing10.1109/TMC.2011.27412:2(318-332)Online publication date: 1-Feb-2013
      • (2011)Fault Reporting in Partially Known Networks and Folk TheoremsOperations Research10.1287/opre.1110.093659:3(754-763)Online publication date: 1-May-2011
      • (2011)Distributed virtual backbone construction in sensor networks with asymmetric linksWireless Communications & Mobile Computing10.1002/wcm.81011:8(1051-1060)Online publication date: 1-Aug-2011
      • (2009)Brief announcementProceedings of the 28th ACM symposium on Principles of distributed computing10.1145/1582716.1582784(314-315)Online publication date: 10-Aug-2009
      • (2009)On the round complexity of Byzantine agreement without initial set-upInformation and Computation10.1016/j.ic.2009.07.002207:12(1351-1368)Online publication date: 1-Dec-2009
      • (2009)On Exponential Lower Bound for Protocols for Reliable Communication in NetworksInformation Theoretic Security10.1007/978-3-642-10230-1_7(89-98)Online publication date: 1-Nov-2009
      • (2007)Achieving convergence-free routing using failure-carrying packetsACM SIGCOMM Computer Communication Review10.1145/1282427.128240837:4(241-252)Online publication date: 27-Aug-2007
      • (2007)Achieving convergence-free routing using failure-carrying packetsProceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications10.1145/1282380.1282408(241-252)Online publication date: 27-Aug-2007
      • (2007)Theoretical bounds on control-plane self-monitoring in routing protocolsACM SIGMETRICS Performance Evaluation Review10.1145/1269899.125492135:1(325-336)Online publication date: 12-Jun-2007
      • (2007)Theoretical bounds on control-plane self-monitoring in routing protocolsProceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems10.1145/1254882.1254921(325-336)Online publication date: 12-Jun-2007
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media