2006
DOI: 10.1007/978-3-540-49823-0_31
|View full text |Cite
|
Sign up to set email alerts
|

Bounding the Impact of Unbounded Attacks in Stabilization

Abstract: Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system. Byzantine tolerance is an attractive feature of distributed systems that permits to cope with arbitrary malicious behaviors. Combining these two properties proved difficult: it is impossible to contain the spatial impact of Byzantine nodes in a self-stabilizing context for global tasks such as tree orientati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
17
0
1

Year Published

2009
2009
2015
2015

Publication Types

Select...
6
3
1

Relationship

3
7

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 11 publications
0
17
0
1
Order By: Relevance
“…This is useful for problems where information from remote nodes is unimportant (such as vertex coloring, link coloring, or dining philosophers). Timelocal algorithms [12], [13], [14], [15], [23] try to limit over time the effect of Byzantine faults. Time-local algorithms presented so far can tolerate the presence of at most a single Byzantine node, and are unable to mask the effect of Byzantine actions.…”
Section: Related Workmentioning
confidence: 99%
“…This is useful for problems where information from remote nodes is unimportant (such as vertex coloring, link coloring, or dining philosophers). Timelocal algorithms [12], [13], [14], [15], [23] try to limit over time the effect of Byzantine faults. Time-local algorithms presented so far can tolerate the presence of at most a single Byzantine node, and are unable to mask the effect of Byzantine actions.…”
Section: Related Workmentioning
confidence: 99%
“…A notable class of algorithms tolerates Byzantine failures with either space [17], [22], [25] or time [6], [7], [8], [9], [16] locality. Space local algorithms try to contain the fault as close to its source as possible.…”
Section: Related Workmentioning
confidence: 99%
“…Pelc and Peleg [20] consider arbitrary topology but assume that each node knows the exact topology a priori. A notable class of algorithms tolerates Byzantine faults with either space [17], [19], [22] or time [16] locality. Yet, the emphasis of space local algorithms is on containing the fault as close to its source as possible.…”
Section: Related Workmentioning
confidence: 99%