We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Optimal agreement under fallible mobile network.
- Authors
Shun-Sheng Wang; Shu-Ching Wang
- Abstract
Due to the network technology that has advanced at an astounding speed, the topology of networks is trending wireless. It is imperative for us to develop mobile commerce or related applications in this wireless network. There are a lot of properties in the wireless network that play important roles. For example, the processors in wireless network have highly mobile capability. In other words, processors can immigrate into or move away from the network at any time. Although the mobile technology has brought greater convenience to us, it is comparatively more dangerous under such wireless environment. For instance, processors have mobility and the illegal processors can intrude the network more easily and do any illegitimate behaviors. In other words, it is not only difficult to ensure its security but it is also susceptible to security flaws such as attacks by the hackers. It will also decrease the allowable number of faulty components in the system. Basically speaking, there are plenty of applications that can be used in the wireless mobile network. For example, it is common to develop the mobile agents in the wireless network. However all problems mentioned will have the mobile agents in fault. It may affect the result of other mobile agents in the middle of carrying out some assignment. Fortunately enough, the Byzantine Agreement problem can help us to solve these problems. Basically, the protocols about Byzantine Agreement (BA) problem used in static networks, however, do not perform well in a dynamically changing mobile network. In addition, the problem of mobility and security is more difficult to solve. Hence, how to solve the BA problem in unsafe environment is eager for us to solve. In order to increase the number of allowable faulty components and ensure the security of the network, a simple, secure, and efficient protocol CBAIM is proposed to handle the BA problem. This protocol uses the minimum number of rounds of message exchange to achieve an agreement and can tolerate maximum number of allowable faulty components. It will also ensure the message security and increase the fault tolerant capability of the system.
- Subjects
WIRELESS communications; TELECOMMUNICATION systems; BYZANTINE law; WIRELESS sensor networks; SENSOR networks
- Publication
Computer Systems Science & Engineering, 2017, Vol 32, Issue 3, p183
- ISSN
0267-6192
- Publication type
Article